Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 1456660 Details for
Bug 1598308
gdm double free on login after screen lock
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
journalctl (everything since boot)
journalct.out (text/plain), 939.30 KB, created by
Peter Hutterer
on 2018-07-05 05:35:15 UTC
(
hide
)
Description:
journalctl (everything since boot)
Filename:
MIME Type:
Creator:
Peter Hutterer
Created:
2018-07-05 05:35:15 UTC
Size:
939.30 KB
patch
obsolete
>-- Logs begin at Thu 2018-07-05 07:54:15 AEST, end at Thu 2018-07-05 15:31:31 AEST. -- >Jul 05 07:54:15 m72e systemd-journal[103]: Runtime journal is using 8.0M (max allowed 390.4M, trying to leave 585.6M free of 3.8G available â current limit 390.4M). >Jul 05 07:54:15 m72e kernel: microcode: microcode updated early to revision 0x1f, date = 2018-02-07 >Jul 05 07:54:15 m72e kernel: Initializing cgroup subsys cpuset >Jul 05 07:54:15 m72e kernel: Initializing cgroup subsys cpu >Jul 05 07:54:15 m72e kernel: Initializing cgroup subsys cpuacct >Jul 05 07:54:15 m72e kernel: Linux version 3.10.0-915.el7.x86_64 (mockbuild@x86-038.build.eng.bos.redhat.com) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-36) (GCC) ) #1 SMP Fri Jun 22 23:49:29 UTC 2018 >Jul 05 07:54:15 m72e kernel: Command line: BOOT_IMAGE=/vmlinuz-3.10.0-915.el7.x86_64 root=UUID=88fb118c-3789-49c4-b13c-ea45edba3a9b ro rhgb quiet LANG=en_AU.utf8 >Jul 05 07:54:15 m72e kernel: e820: BIOS-provided physical RAM map: >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009d7ff] usable >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x000000000009d800-0x000000000009ffff] reserved >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x0000000000100000-0x000000001fffffff] usable >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x0000000020000000-0x00000000201fffff] reserved >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x0000000020200000-0x0000000040003fff] usable >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x0000000040004000-0x0000000040004fff] reserved >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x0000000040005000-0x00000000d561dfff] usable >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000d561e000-0x00000000d58acfff] reserved >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000d58ad000-0x00000000d58bafff] ACPI data >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000d58bb000-0x00000000d5943fff] reserved >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000d5944000-0x00000000d5949fff] ACPI data >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000d594a000-0x00000000d5b8ffff] usable >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000d5b90000-0x00000000d632afff] ACPI NVS >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000d632b000-0x00000000d6888fff] reserved >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000d6889000-0x00000000d6889fff] usable >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000d688a000-0x00000000d68ccfff] ACPI NVS >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000d68cd000-0x00000000d6cc7fff] usable >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000d6cc8000-0x00000000d6ff2fff] reserved >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000d6ff3000-0x00000000d6ffffff] usable >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000d7800000-0x00000000df9fffff] reserved >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000f8000000-0x00000000fbffffff] reserved >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000fed00000-0x00000000fed03fff] reserved >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved >Jul 05 07:54:15 m72e kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021f5fffff] usable >Jul 05 07:54:15 m72e kernel: NX (Execute Disable) protection: active >Jul 05 07:54:15 m72e kernel: SMBIOS 2.7 present. >Jul 05 07:54:15 m72e kernel: DMI: LENOVO 3261CTO/MAHOBAY, BIOS F4KT22AUS 09/26/2012 >Jul 05 07:54:15 m72e kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved >Jul 05 07:54:15 m72e kernel: e820: remove [mem 0x000a0000-0x000fffff] usable >Jul 05 07:54:15 m72e kernel: e820: last_pfn = 0x21f600 max_arch_pfn = 0x400000000 >Jul 05 07:54:15 m72e kernel: MTRR default type: uncachable >Jul 05 07:54:15 m72e kernel: MTRR fixed ranges enabled: >Jul 05 07:54:15 m72e kernel: 00000-9FFFF write-back >Jul 05 07:54:15 m72e kernel: A0000-BFFFF uncachable >Jul 05 07:54:15 m72e kernel: C0000-CFFFF write-protect >Jul 05 07:54:15 m72e kernel: D0000-E7FFF uncachable >Jul 05 07:54:15 m72e kernel: E8000-FFFFF write-protect >Jul 05 07:54:15 m72e kernel: MTRR variable ranges enabled: >Jul 05 07:54:15 m72e kernel: 0 base 000000000 mask E00000000 write-back >Jul 05 07:54:15 m72e kernel: 1 base 200000000 mask FE0000000 write-back >Jul 05 07:54:15 m72e kernel: 2 base 0E0000000 mask FE0000000 uncachable >Jul 05 07:54:15 m72e kernel: 3 base 0D8000000 mask FF8000000 uncachable >Jul 05 07:54:15 m72e kernel: 4 base 0D7800000 mask FFF800000 uncachable >Jul 05 07:54:15 m72e kernel: 5 base 21F800000 mask FFF800000 uncachable >Jul 05 07:54:15 m72e kernel: 6 base 21F600000 mask FFFE00000 uncachable >Jul 05 07:54:15 m72e kernel: 7 disabled >Jul 05 07:54:15 m72e kernel: 8 disabled >Jul 05 07:54:15 m72e kernel: 9 disabled >Jul 05 07:54:15 m72e kernel: PAT configuration [0-7]: WB WC UC- UC WB WP UC- UC >Jul 05 07:54:15 m72e kernel: original variable MTRRs >Jul 05 07:54:15 m72e kernel: reg 0, base: 0GB, range: 8GB, type WB >Jul 05 07:54:15 m72e kernel: reg 1, base: 8GB, range: 512MB, type WB >Jul 05 07:54:15 m72e kernel: reg 2, base: 3584MB, range: 512MB, type UC >Jul 05 07:54:15 m72e kernel: reg 3, base: 3456MB, range: 128MB, type UC >Jul 05 07:54:15 m72e kernel: reg 4, base: 3448MB, range: 8MB, type UC >Jul 05 07:54:15 m72e kernel: reg 5, base: 8696MB, range: 8MB, type UC >Jul 05 07:54:15 m72e kernel: reg 6, base: 8694MB, range: 2MB, type UC >Jul 05 07:54:15 m72e kernel: total RAM covered: 8046M >Jul 05 07:54:15 m72e kernel: Found optimal setting for mtrr clean up >Jul 05 07:54:15 m72e kernel: gran_size: 64K chunk_size: 16M num_reg: 9 lose cover RAM: 0G >Jul 05 07:54:15 m72e kernel: New variable MTRRs >Jul 05 07:54:15 m72e kernel: reg 0, base: 0GB, range: 2GB, type WB >Jul 05 07:54:15 m72e kernel: reg 1, base: 2GB, range: 1GB, type WB >Jul 05 07:54:15 m72e kernel: reg 2, base: 3GB, range: 256MB, type WB >Jul 05 07:54:15 m72e kernel: reg 3, base: 3328MB, range: 128MB, type WB >Jul 05 07:54:15 m72e kernel: reg 4, base: 3448MB, range: 8MB, type UC >Jul 05 07:54:15 m72e kernel: reg 5, base: 4GB, range: 4GB, type WB >Jul 05 07:54:15 m72e kernel: reg 6, base: 8GB, range: 512MB, type WB >Jul 05 07:54:15 m72e kernel: reg 7, base: 8694MB, range: 2MB, type UC >Jul 05 07:54:15 m72e kernel: reg 8, base: 8696MB, range: 8MB, type UC >Jul 05 07:54:15 m72e kernel: e820: update [mem 0xd7800000-0xffffffff] usable ==> reserved >Jul 05 07:54:15 m72e kernel: e820: last_pfn = 0xd7000 max_arch_pfn = 0x400000000 >Jul 05 07:54:15 m72e kernel: found SMP MP-table at [mem 0x000fcdb0-0x000fcdbf] mapped at [ffffffffff200db0] >Jul 05 07:54:15 m72e kernel: Base memory trampoline at [ffff95b740097000] 97000 size 24576 >Jul 05 07:54:15 m72e kernel: BRK [0x14de4d000, 0x14de4dfff] PGTABLE >Jul 05 07:54:15 m72e kernel: BRK [0x14de4e000, 0x14de4efff] PGTABLE >Jul 05 07:54:15 m72e kernel: BRK [0x14de4f000, 0x14de4ffff] PGTABLE >Jul 05 07:54:15 m72e kernel: BRK [0x14de50000, 0x14de50fff] PGTABLE >Jul 05 07:54:15 m72e kernel: BRK [0x14de51000, 0x14de51fff] PGTABLE >Jul 05 07:54:15 m72e kernel: BRK [0x14de52000, 0x14de52fff] PGTABLE >Jul 05 07:54:15 m72e kernel: BRK [0x14de53000, 0x14de53fff] PGTABLE >Jul 05 07:54:15 m72e kernel: BRK [0x14de54000, 0x14de54fff] PGTABLE >Jul 05 07:54:15 m72e kernel: BRK [0x14de55000, 0x14de55fff] PGTABLE >Jul 05 07:54:15 m72e kernel: BRK [0x14de56000, 0x14de56fff] PGTABLE >Jul 05 07:54:15 m72e kernel: BRK [0x14de57000, 0x14de57fff] PGTABLE >Jul 05 07:54:15 m72e kernel: BRK [0x14de58000, 0x14de58fff] PGTABLE >Jul 05 07:54:15 m72e kernel: RAMDISK: [mem 0x345f4000-0x362f1fff] >Jul 05 07:54:15 m72e kernel: Early table checksum verification disabled >Jul 05 07:54:15 m72e kernel: ACPI: RSDP 00000000000f0450 00024 (v02 LENOVO) >Jul 05 07:54:15 m72e kernel: ACPI: XSDT 00000000d58ad078 00074 (v01 LENOVO TC-F4 00000116 AMI 00010013) >Jul 05 07:54:15 m72e kernel: ACPI: FACP 00000000d58b88a0 000F4 (v04 LENOVO TC-F4 00000116 AMI 00010013) >Jul 05 07:54:15 m72e kernel: ACPI: DSDT 00000000d58ad180 0B71B (v02 LENOVO TC-F4 00000116 INTL 20051117) >Jul 05 07:54:15 m72e kernel: ACPI: FACS 00000000d6329f80 00040 >Jul 05 07:54:15 m72e kernel: ACPI: APIC 00000000d58b8998 00072 (v03 LENOVO TC-F4 00000116 AMI 00010013) >Jul 05 07:54:15 m72e kernel: ACPI: FPDT 00000000d58b8a10 00044 (v01 LENOVO TC-F4 00000116 AMI 00010013) >Jul 05 07:54:15 m72e kernel: ACPI: ASF! 00000000d58b8a58 000A5 (v32 LENOVO TC-F4 00000116 TFSM 000F4240) >Jul 05 07:54:15 m72e kernel: ACPI: MCFG 00000000d58b8b00 0003C (v01 LENOVO TC-F4 00000116 MSFT 00000097) >Jul 05 07:54:15 m72e kernel: ACPI: SLIC 00000000d58b8b40 00176 (v01 LENOVO TC-F4 00000116 AMI 00010013) >Jul 05 07:54:15 m72e kernel: ACPI: HPET 00000000d58b8cb8 00038 (v01 LENOVO TC-F4 00000116 AMI. 00000005) >Jul 05 07:54:15 m72e kernel: ACPI: SSDT 00000000d58b8cf0 0036D (v01 LENOVO TC-F4 00000116 INTL 20091112) >Jul 05 07:54:15 m72e kernel: ACPI: SSDT 00000000d58b9060 00968 (v01 LENOVO TC-F4 00000116 INTL 20051117) >Jul 05 07:54:15 m72e kernel: ACPI: SSDT 00000000d58b99c8 00A92 (v01 LENOVO TC-F4 00000116 INTL 20051117) >Jul 05 07:54:15 m72e kernel: ACPI: Local APIC address 0xfee00000 >Jul 05 07:54:15 m72e kernel: No NUMA configuration found >Jul 05 07:54:15 m72e kernel: Faking a node at [mem 0x0000000000000000-0x000000021f5fffff] >Jul 05 07:54:15 m72e kernel: NODE_DATA(0) allocated [mem 0x21f5d2000-0x21f5f8fff] >Jul 05 07:54:15 m72e kernel: Zone ranges: >Jul 05 07:54:15 m72e kernel: DMA [mem 0x00001000-0x00ffffff] >Jul 05 07:54:15 m72e kernel: DMA32 [mem 0x01000000-0xffffffff] >Jul 05 07:54:15 m72e kernel: Normal [mem 0x100000000-0x21f5fffff] >Jul 05 07:54:15 m72e kernel: Movable zone start for each node >Jul 05 07:54:15 m72e kernel: Early memory node ranges >Jul 05 07:54:15 m72e kernel: node 0: [mem 0x00001000-0x0009cfff] >Jul 05 07:54:15 m72e kernel: node 0: [mem 0x00100000-0x1fffffff] >Jul 05 07:54:15 m72e kernel: node 0: [mem 0x20200000-0x40003fff] >Jul 05 07:54:15 m72e kernel: node 0: [mem 0x40005000-0xd561dfff] >Jul 05 07:54:15 m72e kernel: node 0: [mem 0xd594a000-0xd5b8ffff] >Jul 05 07:54:15 m72e kernel: node 0: [mem 0xd6889000-0xd6889fff] >Jul 05 07:54:15 m72e kernel: node 0: [mem 0xd68cd000-0xd6cc7fff] >Jul 05 07:54:15 m72e kernel: node 0: [mem 0xd6ff3000-0xd6ffffff] >Jul 05 07:54:15 m72e kernel: node 0: [mem 0x100000000-0x21f5fffff] >Jul 05 07:54:15 m72e kernel: Initmem setup node 0 [mem 0x00001000-0x21f5fffff] >Jul 05 07:54:15 m72e kernel: On node 0 totalpages: 2052104 >Jul 05 07:54:15 m72e kernel: DMA zone: 64 pages used for memmap >Jul 05 07:54:15 m72e kernel: DMA zone: 21 pages reserved >Jul 05 07:54:15 m72e kernel: DMA zone: 3996 pages, LIFO batch:0 >Jul 05 07:54:15 m72e kernel: DMA32 zone: 13610 pages used for memmap >Jul 05 07:54:15 m72e kernel: DMA32 zone: 871020 pages, LIFO batch:31 >Jul 05 07:54:15 m72e kernel: Normal zone: 18392 pages used for memmap >Jul 05 07:54:15 m72e kernel: Normal zone: 1177088 pages, LIFO batch:31 >Jul 05 07:54:15 m72e kernel: Reserving Intel graphics memory at [mem 0xd7a00000-0xdf9fffff] >Jul 05 07:54:15 m72e kernel: ACPI: PM-Timer IO Port: 0x408 >Jul 05 07:54:15 m72e kernel: ACPI: Local APIC address 0xfee00000 >Jul 05 07:54:15 m72e kernel: ACPI: LAPIC (acpi_id[0x01] lapic_id[0x00] enabled) >Jul 05 07:54:15 m72e kernel: ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled) >Jul 05 07:54:15 m72e kernel: ACPI: LAPIC (acpi_id[0x03] lapic_id[0x01] enabled) >Jul 05 07:54:15 m72e kernel: ACPI: LAPIC (acpi_id[0x04] lapic_id[0x03] enabled) >Jul 05 07:54:15 m72e kernel: ACPI: LAPIC_NMI (acpi_id[0xff] high edge lint[0x1]) >Jul 05 07:54:15 m72e kernel: ACPI: IOAPIC (id[0x02] address[0xfec00000] gsi_base[0]) >Jul 05 07:54:15 m72e kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-23 >Jul 05 07:54:15 m72e kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) >Jul 05 07:54:15 m72e kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) >Jul 05 07:54:15 m72e kernel: ACPI: IRQ0 used by override. >Jul 05 07:54:15 m72e kernel: ACPI: IRQ9 used by override. >Jul 05 07:54:15 m72e kernel: Using ACPI (MADT) for SMP configuration information >Jul 05 07:54:15 m72e kernel: ACPI: HPET id: 0x8086a701 base: 0xfed00000 >Jul 05 07:54:15 m72e kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0x0009d000-0x0009dfff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0x0009e000-0x0009ffff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000dffff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0x000e0000-0x000fffff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0x20000000-0x201fffff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0x40004000-0x40004fff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xd561e000-0xd58acfff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xd58ad000-0xd58bafff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xd58bb000-0xd5943fff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xd5944000-0xd5949fff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xd5b90000-0xd632afff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xd632b000-0xd6888fff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xd688a000-0xd68ccfff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xd6cc8000-0xd6ff2fff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xd7000000-0xd77fffff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xd7800000-0xdf9fffff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xdfa00000-0xf7ffffff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xf8000000-0xfbffffff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xfc000000-0xfebfffff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xfec00000-0xfec00fff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xfec01000-0xfecfffff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xfed00000-0xfed03fff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xfed04000-0xfed1bfff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xfed1c000-0xfed1ffff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xfed20000-0xfedfffff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xfee00000-0xfee00fff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xfee01000-0xfeffffff] >Jul 05 07:54:15 m72e kernel: PM: Registered nosave memory: [mem 0xff000000-0xffffffff] >Jul 05 07:54:15 m72e kernel: e820: [mem 0xdfa00000-0xf7ffffff] available for PCI devices >Jul 05 07:54:15 m72e kernel: Booting paravirtualized kernel on bare hardware >Jul 05 07:54:15 m72e kernel: setup_percpu: NR_CPUS:5120 nr_cpumask_bits:4 nr_cpu_ids:4 nr_node_ids:1 >Jul 05 07:54:15 m72e kernel: PERCPU: Embedded 37 pages/cpu @ffff95b95f200000 s113368 r8192 d29992 u524288 >Jul 05 07:54:15 m72e kernel: pcpu-alloc: s113368 r8192 d29992 u524288 alloc=1*2097152 >Jul 05 07:54:15 m72e kernel: pcpu-alloc: [0] 0 1 2 3 >Jul 05 07:54:15 m72e kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 2020017 >Jul 05 07:54:15 m72e kernel: Policy zone: Normal >Jul 05 07:54:15 m72e kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-3.10.0-915.el7.x86_64 root=UUID=88fb118c-3789-49c4-b13c-ea45edba3a9b ro rhgb quiet LANG=en_AU.utf8 >Jul 05 07:54:15 m72e kernel: PID hash table entries: 4096 (order: 3, 32768 bytes) >Jul 05 07:54:15 m72e kernel: x86/fpu: xstate_offset[2]: 0240, xstate_sizes[2]: 0100 >Jul 05 07:54:15 m72e kernel: xsave: enabled xstate_bv 0x7, cntxt size 0x340 using standard form >Jul 05 07:54:15 m72e kernel: Memory: 5483088k/8902656k available (7600k kernel code, 694240k absent, 244672k reserved, 6115k data, 1868k init) >Jul 05 07:54:15 m72e kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 >Jul 05 07:54:15 m72e kernel: x86/pti: Unmapping kernel while in userspace >Jul 05 07:54:15 m72e kernel: Hierarchical RCU implementation. >Jul 05 07:54:15 m72e kernel: RCU restricting CPUs from NR_CPUS=5120 to nr_cpu_ids=4. >Jul 05 07:54:15 m72e kernel: NR_IRQS:327936 nr_irqs:456 0 >Jul 05 07:54:15 m72e kernel: Console: colour VGA+ 80x25 >Jul 05 07:54:15 m72e kernel: console [tty0] enabled >Jul 05 07:54:15 m72e kernel: allocated 33030144 bytes of page_cgroup >Jul 05 07:54:15 m72e kernel: please try 'cgroup_disable=memory' option if you don't want memory cgroups >Jul 05 07:54:15 m72e kernel: hpet clockevent registered >Jul 05 07:54:15 m72e kernel: tsc: Fast TSC calibration using PIT >Jul 05 07:54:15 m72e kernel: tsc: Detected 2893.663 MHz processor >Jul 05 07:54:15 m72e kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5787.32 BogoMIPS (lpj=2893663) >Jul 05 07:54:15 m72e kernel: pid_max: default: 32768 minimum: 301 >Jul 05 07:54:15 m72e kernel: Security Framework initialized >Jul 05 07:54:15 m72e kernel: SELinux: Initializing. >Jul 05 07:54:15 m72e kernel: SELinux: Starting in permissive mode >Jul 05 07:54:15 m72e kernel: Yama: becoming mindful. >Jul 05 07:54:15 m72e kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes) >Jul 05 07:54:15 m72e kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes) >Jul 05 07:54:15 m72e kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes) >Jul 05 07:54:15 m72e kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes) >Jul 05 07:54:15 m72e kernel: Initializing cgroup subsys memory >Jul 05 07:54:15 m72e kernel: Initializing cgroup subsys devices >Jul 05 07:54:15 m72e kernel: Initializing cgroup subsys freezer >Jul 05 07:54:15 m72e kernel: Initializing cgroup subsys net_cls >Jul 05 07:54:15 m72e kernel: Initializing cgroup subsys blkio >Jul 05 07:54:15 m72e kernel: Initializing cgroup subsys perf_event >Jul 05 07:54:15 m72e kernel: Initializing cgroup subsys hugetlb >Jul 05 07:54:15 m72e kernel: Initializing cgroup subsys pids >Jul 05 07:54:15 m72e kernel: Initializing cgroup subsys net_prio >Jul 05 07:54:15 m72e kernel: CPU: Physical Processor ID: 0 >Jul 05 07:54:15 m72e kernel: CPU: Processor Core ID: 0 >Jul 05 07:54:15 m72e kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' >Jul 05 07:54:15 m72e kernel: ENERGY_PERF_BIAS: View and update with x86_energy_perf_policy(8) >Jul 05 07:54:15 m72e kernel: mce: CPU supports 7 MCE banks >Jul 05 07:54:15 m72e kernel: CPU0: Thermal monitoring enabled (TM1) >Jul 05 07:54:15 m72e kernel: Last level iTLB entries: 4KB 512, 2MB 0, 4MB 0 >Jul 05 07:54:15 m72e kernel: Last level dTLB entries: 4KB 512, 2MB 32, 4MB 32 >Jul 05 07:54:15 m72e kernel: tlb_flushall_shift: 2 >Jul 05 07:54:15 m72e kernel: Speculative Store Bypass: Vulnerable >Jul 05 07:54:15 m72e kernel: FEATURE SPEC_CTRL Present >Jul 05 07:54:15 m72e kernel: FEATURE IBPB_SUPPORT Present >Jul 05 07:54:15 m72e kernel: Spectre V2 : Mitigation: Full retpoline >Jul 05 07:54:15 m72e kernel: Freeing SMP alternatives: 24k freed >Jul 05 07:54:15 m72e kernel: ACPI: Core revision 20130517 >Jul 05 07:54:15 m72e kernel: ACPI: All ACPI Tables successfully acquired >Jul 05 07:54:15 m72e kernel: ftrace: allocating 28974 entries in 114 pages >Jul 05 07:54:15 m72e kernel: IRQ remapping doesn't support X2APIC mode, disable x2apic. >Jul 05 07:54:15 m72e kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 >Jul 05 07:54:15 m72e kernel: smpboot: CPU0: Intel(R) Core(TM) i5-3470T CPU @ 2.90GHz (fam: 06, model: 3a, stepping: 09) >Jul 05 07:54:15 m72e kernel: TSC deadline timer enabled >Jul 05 07:54:15 m72e kernel: Performance Events: PEBS fmt1+, IvyBridge events, 16-deep LBR, full-width counters, Intel PMU driver. >Jul 05 07:54:15 m72e kernel: ... version: 3 >Jul 05 07:54:15 m72e kernel: ... bit width: 48 >Jul 05 07:54:15 m72e kernel: ... generic registers: 4 >Jul 05 07:54:15 m72e kernel: ... value mask: 0000ffffffffffff >Jul 05 07:54:15 m72e kernel: ... max period: 00007fffffffffff >Jul 05 07:54:15 m72e kernel: ... fixed-purpose events: 3 >Jul 05 07:54:15 m72e kernel: ... event mask: 000000070000000f >Jul 05 07:54:15 m72e kernel: NMI watchdog: enabled on all CPUs, permanently consumes one hw-PMU counter. >Jul 05 07:54:15 m72e kernel: smpboot: Booting Node 0, Processors #1 #2 #3 OK >Jul 05 07:54:15 m72e kernel: Brought up 4 CPUs >Jul 05 07:54:15 m72e kernel: smpboot: Max logical packages: 1 >Jul 05 07:54:15 m72e kernel: smpboot: Total of 4 processors activated (23149.30 BogoMIPS) >Jul 05 07:54:15 m72e kernel: node 0 initialised, 620164 pages in 12ms >Jul 05 07:54:15 m72e kernel: devtmpfs: initialized >Jul 05 07:54:15 m72e kernel: EVM: security.selinux >Jul 05 07:54:15 m72e kernel: EVM: security.ima >Jul 05 07:54:15 m72e kernel: EVM: security.capability >Jul 05 07:54:15 m72e kernel: PM: Registering ACPI NVS region [mem 0xd5b90000-0xd632afff] (7974912 bytes) >Jul 05 07:54:15 m72e kernel: PM: Registering ACPI NVS region [mem 0xd688a000-0xd68ccfff] (274432 bytes) >Jul 05 07:54:15 m72e kernel: atomic64 test passed for x86-64 platform with CX8 and with SSE >Jul 05 07:54:15 m72e kernel: pinctrl core: initialized pinctrl subsystem >Jul 05 07:54:15 m72e kernel: RTC time: 21:54:13, date: 07/04/18 >Jul 05 07:54:15 m72e kernel: NET: Registered protocol family 16 >Jul 05 07:54:15 m72e kernel: ACPI: bus type PCI registered >Jul 05 07:54:15 m72e kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 >Jul 05 07:54:15 m72e kernel: PCI: MMCONFIG for domain 0000 [bus 00-3f] at [mem 0xf8000000-0xfbffffff] (base 0xf8000000) >Jul 05 07:54:15 m72e kernel: PCI: MMCONFIG at [mem 0xf8000000-0xfbffffff] reserved in E820 >Jul 05 07:54:15 m72e kernel: PCI: Using configuration type 1 for base access >Jul 05 07:54:15 m72e kernel: core: PMU erratum BJ122, BV98, HSD29 worked around, HT is on >Jul 05 07:54:15 m72e kernel: ACPI: Added _OSI(Module Device) >Jul 05 07:54:15 m72e kernel: ACPI: Added _OSI(Processor Device) >Jul 05 07:54:15 m72e kernel: ACPI: Added _OSI(3.0 _SCP Extensions) >Jul 05 07:54:15 m72e kernel: ACPI: Added _OSI(Processor Aggregator Device) >Jul 05 07:54:15 m72e kernel: ACPI: Added _OSI(Linux-Dell-Video) >Jul 05 07:54:15 m72e kernel: ACPI: EC: Look up EC in DSDT >Jul 05 07:54:15 m72e kernel: ACPI: Executed 1 blocks of module-level executable AML code >Jul 05 07:54:15 m72e kernel: ACPI: Dynamic OEM Table Load: >Jul 05 07:54:15 m72e kernel: ACPI: SSDT ffff95b95f1ff000 0083B (v01 PmRef Cpu0Cst 00003001 INTL 20051117) >Jul 05 07:54:15 m72e kernel: ACPI: Dynamic OEM Table Load: >Jul 05 07:54:15 m72e kernel: ACPI: SSDT ffff95b95f452000 00303 (v01 PmRef ApIst 00003000 INTL 20051117) >Jul 05 07:54:15 m72e kernel: ACPI: Dynamic OEM Table Load: >Jul 05 07:54:15 m72e kernel: ACPI: SSDT ffff95b95f412400 00119 (v01 PmRef ApCst 00003000 INTL 20051117) >Jul 05 07:54:15 m72e kernel: ACPI: Interpreter enabled >Jul 05 07:54:15 m72e kernel: ACPI: (supports S0 S3 S4 S5) >Jul 05 07:54:15 m72e kernel: ACPI: Using IOAPIC for interrupt routing >Jul 05 07:54:15 m72e kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug >Jul 05 07:54:15 m72e kernel: ACPI: Enabled 16 GPEs in block 00 to 3F >Jul 05 07:54:15 m72e kernel: ACPI: Power Resource [FN00] (off) >Jul 05 07:54:15 m72e kernel: ACPI: Power Resource [FN01] (off) >Jul 05 07:54:15 m72e kernel: ACPI: Power Resource [FN02] (off) >Jul 05 07:54:15 m72e kernel: ACPI: Power Resource [FN03] (off) >Jul 05 07:54:15 m72e kernel: ACPI: Power Resource [FN04] (off) >Jul 05 07:54:15 m72e kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored >Jul 05 07:54:15 m72e kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-3e]) >Jul 05 07:54:15 m72e kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI] >Jul 05 07:54:15 m72e kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug SHPCHotplug PME AER PCIeCapability] >Jul 05 07:54:15 m72e kernel: PCI host bridge to bus 0000:00 >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: root bus resource [mem 0x000dc000-0x000dffff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: root bus resource [mem 0x000e0000-0x000e3fff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: root bus resource [mem 0x000e4000-0x000e7fff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: root bus resource [mem 0xdfa00000-0xfeafffff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: root bus resource [bus 00-3e] >Jul 05 07:54:15 m72e kernel: pci 0000:00:00.0: [8086:0150] type 00 class 0x060000 >Jul 05 07:54:15 m72e kernel: pci 0000:00:02.0: [8086:0152] type 00 class 0x030000 >Jul 05 07:54:15 m72e kernel: pci 0000:00:02.0: reg 0x10: [mem 0xf7800000-0xf7bfffff 64bit] >Jul 05 07:54:15 m72e kernel: pci 0000:00:02.0: reg 0x18: [mem 0xe0000000-0xefffffff 64bit pref] >Jul 05 07:54:15 m72e kernel: pci 0000:00:02.0: reg 0x20: [io 0xf000-0xf03f] >Jul 05 07:54:15 m72e kernel: pci 0000:00:16.0: [8086:1c3a] type 00 class 0x078000 >Jul 05 07:54:15 m72e kernel: pci 0000:00:16.0: reg 0x10: [mem 0xf7e0a000-0xf7e0a00f 64bit] >Jul 05 07:54:15 m72e kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold >Jul 05 07:54:15 m72e kernel: pci 0000:00:1a.0: [8086:1c2d] type 00 class 0x0c0320 >Jul 05 07:54:15 m72e kernel: pci 0000:00:1a.0: reg 0x10: [mem 0xf7e08000-0xf7e083ff] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1a.0: PME# supported from D0 D3hot D3cold >Jul 05 07:54:15 m72e kernel: pci 0000:00:1a.0: System wakeup disabled by ACPI >Jul 05 07:54:15 m72e kernel: pci 0000:00:1b.0: [8086:1c20] type 00 class 0x040300 >Jul 05 07:54:15 m72e kernel: pci 0000:00:1b.0: reg 0x10: [mem 0xf7e00000-0xf7e03fff 64bit] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold >Jul 05 07:54:15 m72e kernel: pci 0000:00:1b.0: System wakeup disabled by ACPI >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.0: [8086:1c10] type 01 class 0x060400 >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.0: System wakeup disabled by ACPI >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.4: [8086:1c18] type 01 class 0x060400 >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.4: PME# supported from D0 D3hot D3cold >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.4: System wakeup disabled by ACPI >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.5: [8086:1c1a] type 01 class 0x060400 >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.5: PME# supported from D0 D3hot D3cold >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.5: System wakeup disabled by ACPI >Jul 05 07:54:15 m72e kernel: pci 0000:00:1d.0: [8086:1c26] type 00 class 0x0c0320 >Jul 05 07:54:15 m72e kernel: pci 0000:00:1d.0: reg 0x10: [mem 0xf7e07000-0xf7e073ff] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1d.0: PME# supported from D0 D3hot D3cold >Jul 05 07:54:15 m72e kernel: pci 0000:00:1d.0: System wakeup disabled by ACPI >Jul 05 07:54:15 m72e kernel: pci 0000:00:1f.0: [8086:1c5c] type 00 class 0x060100 >Jul 05 07:54:15 m72e kernel: pci 0000:00:1f.2: [8086:1c02] type 00 class 0x010601 >Jul 05 07:54:15 m72e kernel: pci 0000:00:1f.2: reg 0x10: [io 0xf0b0-0xf0b7] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1f.2: reg 0x14: [io 0xf0a0-0xf0a3] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1f.2: reg 0x18: [io 0xf090-0xf097] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1f.2: reg 0x1c: [io 0xf080-0xf083] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1f.2: reg 0x20: [io 0xf060-0xf07f] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xf7e06000-0xf7e067ff] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1f.2: PME# supported from D3hot >Jul 05 07:54:15 m72e kernel: pci 0000:00:1f.3: [8086:1c22] type 00 class 0x0c0500 >Jul 05 07:54:15 m72e kernel: pci 0000:00:1f.3: reg 0x10: [mem 0xf7e05000-0xf7e050ff 64bit] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1f.3: reg 0x20: [io 0xf040-0xf05f] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1f.6: [8086:1c24] type 00 class 0x118000 >Jul 05 07:54:15 m72e kernel: pci 0000:00:1f.6: reg 0x10: [mem 0xf7e04000-0xf7e04fff 64bit] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.0: PCI bridge to [bus 01] >Jul 05 07:54:15 m72e kernel: pci 0000:02:00.0: [8086:0888] type 00 class 0x028000 >Jul 05 07:54:15 m72e kernel: pci 0000:02:00.0: reg 0x10: [mem 0xf7d00000-0xf7d01fff 64bit] >Jul 05 07:54:15 m72e kernel: pci 0000:02:00.0: PME# supported from D0 D3hot D3cold >Jul 05 07:54:15 m72e kernel: pci 0000:02:00.0: System wakeup disabled by ACPI >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.4: PCI bridge to [bus 02] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.4: bridge window [mem 0xf7d00000-0xf7dfffff] >Jul 05 07:54:15 m72e kernel: pci 0000:03:00.0: [10ec:8168] type 00 class 0x020000 >Jul 05 07:54:15 m72e kernel: pci 0000:03:00.0: reg 0x10: [io 0xe000-0xe0ff] >Jul 05 07:54:15 m72e kernel: pci 0000:03:00.0: reg 0x18: [mem 0xf7c00000-0xf7c00fff 64bit] >Jul 05 07:54:15 m72e kernel: pci 0000:03:00.0: reg 0x20: [mem 0xf0000000-0xf0003fff 64bit pref] >Jul 05 07:54:15 m72e kernel: pci 0000:03:00.0: supports D1 D2 >Jul 05 07:54:15 m72e kernel: pci 0000:03:00.0: PME# supported from D0 D1 D2 D3hot D3cold >Jul 05 07:54:15 m72e kernel: pci 0000:03:00.0: System wakeup disabled by ACPI >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.5: bridge window [io 0xe000-0xefff] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.5: bridge window [mem 0xf7c00000-0xf7cfffff] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.5: bridge window [mem 0xf0000000-0xf00fffff 64bit pref] >Jul 05 07:54:15 m72e kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 6 10 *11 12 14 15) >Jul 05 07:54:15 m72e kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs *3 4 5 6 10 11 12 14 15) >Jul 05 07:54:15 m72e kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 5 6 10 *11 12 14 15) >Jul 05 07:54:15 m72e kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 3 4 5 6 *10 11 12 14 15) >Jul 05 07:54:15 m72e kernel: ACPI: PCI Interrupt Link [LNKE] (IRQs 3 4 5 6 10 11 12 14 15) *0, disabled. >Jul 05 07:54:15 m72e kernel: ACPI: PCI Interrupt Link [LNKF] (IRQs 3 4 5 6 10 11 12 14 15) *0, disabled. >Jul 05 07:54:15 m72e kernel: ACPI: PCI Interrupt Link [LNKG] (IRQs 3 4 *5 6 10 11 12 14 15) >Jul 05 07:54:15 m72e kernel: ACPI: PCI Interrupt Link [LNKH] (IRQs 3 *4 5 6 10 11 12 14 15) >Jul 05 07:54:15 m72e kernel: vgaarb: device added: PCI:0000:00:02.0,decodes=io+mem,owns=io+mem,locks=none >Jul 05 07:54:15 m72e kernel: vgaarb: loaded >Jul 05 07:54:15 m72e kernel: vgaarb: bridge control possible 0000:00:02.0 >Jul 05 07:54:15 m72e kernel: SCSI subsystem initialized >Jul 05 07:54:15 m72e kernel: ACPI: bus type USB registered >Jul 05 07:54:15 m72e kernel: usbcore: registered new interface driver usbfs >Jul 05 07:54:15 m72e kernel: usbcore: registered new interface driver hub >Jul 05 07:54:15 m72e kernel: usbcore: registered new device driver usb >Jul 05 07:54:15 m72e kernel: EDAC MC: Ver: 3.0.0 >Jul 05 07:54:15 m72e kernel: PCI: Using ACPI for IRQ routing >Jul 05 07:54:15 m72e kernel: PCI: pci_cache_line_size set to 64 bytes >Jul 05 07:54:15 m72e kernel: e820: reserve RAM buffer [mem 0x0009d800-0x0009ffff] >Jul 05 07:54:15 m72e kernel: e820: reserve RAM buffer [mem 0x40004000-0x43ffffff] >Jul 05 07:54:15 m72e kernel: e820: reserve RAM buffer [mem 0xd561e000-0xd7ffffff] >Jul 05 07:54:15 m72e kernel: e820: reserve RAM buffer [mem 0xd5b90000-0xd7ffffff] >Jul 05 07:54:15 m72e kernel: e820: reserve RAM buffer [mem 0xd688a000-0xd7ffffff] >Jul 05 07:54:15 m72e kernel: e820: reserve RAM buffer [mem 0xd6cc8000-0xd7ffffff] >Jul 05 07:54:15 m72e kernel: e820: reserve RAM buffer [mem 0xd7000000-0xd7ffffff] >Jul 05 07:54:15 m72e kernel: e820: reserve RAM buffer [mem 0x21f600000-0x21fffffff] >Jul 05 07:54:15 m72e kernel: NetLabel: Initializing >Jul 05 07:54:15 m72e kernel: NetLabel: domain hash size = 128 >Jul 05 07:54:15 m72e kernel: NetLabel: protocols = UNLABELED CIPSOv4 >Jul 05 07:54:15 m72e kernel: NetLabel: unlabeled traffic allowed by default >Jul 05 07:54:15 m72e kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 >Jul 05 07:54:15 m72e kernel: hpet0: 8 comparators, 64-bit 14.318180 MHz counter >Jul 05 07:54:15 m72e kernel: amd_nb: Cannot enumerate AMD northbridges >Jul 05 07:54:15 m72e kernel: Switched to clocksource hpet >Jul 05 07:54:15 m72e kernel: pnp: PnP ACPI init >Jul 05 07:54:15 m72e kernel: ACPI: bus type PNP registered >Jul 05 07:54:15 m72e kernel: system 00:00: [mem 0xfed40000-0xfed44fff] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:00: Plug and Play ACPI device, IDs PNP0c01 (active) >Jul 05 07:54:15 m72e kernel: system 00:01: [io 0x0680-0x069f] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:01: [io 0x0200-0x020f] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:01: [io 0xffff] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:01: [io 0xffff] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:01: [io 0x0400-0x0453] could not be reserved >Jul 05 07:54:15 m72e kernel: system 00:01: [io 0x0458-0x047f] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:01: [io 0x0500-0x057f] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:01: [io 0x164e-0x164f] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:01: Plug and Play ACPI device, IDs PNP0c02 (active) >Jul 05 07:54:15 m72e kernel: pnp 00:02: Plug and Play ACPI device, IDs PNP0b00 (active) >Jul 05 07:54:15 m72e kernel: system 00:03: [io 0x0454-0x0457] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:03: Plug and Play ACPI device, IDs INT3f0d PNP0c02 (active) >Jul 05 07:54:15 m72e kernel: system 00:04: [io 0x0a00-0x0a1f] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:04: [io 0x0a30-0x0a3f] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:04: [io 0x0a20-0x0a2f] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:04: Plug and Play ACPI device, IDs PNP0c02 (active) >Jul 05 07:54:15 m72e kernel: system 00:05: [io 0x04d0-0x04d1] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:05: Plug and Play ACPI device, IDs PNP0c02 (active) >Jul 05 07:54:15 m72e kernel: system 00:06: [mem 0xfed1c000-0xfed1ffff] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:06: [mem 0xf8000000-0xfbffffff] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:06: [mem 0xfed90000-0xfed93fff] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:06: [mem 0xff000000-0xffffffff] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved >Jul 05 07:54:15 m72e kernel: system 00:06: [mem 0xdfa00000-0xdfa00fff] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:06: Plug and Play ACPI device, IDs PNP0c02 (active) >Jul 05 07:54:15 m72e kernel: system 00:07: [mem 0x20000000-0x201fffff] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:07: [mem 0x40004000-0x40004fff] has been reserved >Jul 05 07:54:15 m72e kernel: system 00:07: Plug and Play ACPI device, IDs PNP0c01 (active) >Jul 05 07:54:15 m72e kernel: pnp: PnP ACPI: found 8 devices >Jul 05 07:54:15 m72e kernel: ACPI: bus type PNP unregistered >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.0: PCI bridge to [bus 01] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.4: PCI bridge to [bus 02] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.4: bridge window [mem 0xf7d00000-0xf7dfffff] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.5: PCI bridge to [bus 03] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.5: bridge window [io 0xe000-0xefff] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.5: bridge window [mem 0xf7c00000-0xf7cfffff] >Jul 05 07:54:15 m72e kernel: pci 0000:00:1c.5: bridge window [mem 0xf0000000-0xf00fffff 64bit pref] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: resource 7 [mem 0x000d0000-0x000d3fff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: resource 8 [mem 0x000d4000-0x000d7fff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: resource 9 [mem 0x000d8000-0x000dbfff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: resource 10 [mem 0x000dc000-0x000dffff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: resource 11 [mem 0x000e0000-0x000e3fff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: resource 12 [mem 0x000e4000-0x000e7fff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:00: resource 13 [mem 0xdfa00000-0xfeafffff window] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:02: resource 1 [mem 0xf7d00000-0xf7dfffff] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:03: resource 0 [io 0xe000-0xefff] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:03: resource 1 [mem 0xf7c00000-0xf7cfffff] >Jul 05 07:54:15 m72e kernel: pci_bus 0000:03: resource 2 [mem 0xf0000000-0xf00fffff 64bit pref] >Jul 05 07:54:15 m72e kernel: NET: Registered protocol family 2 >Jul 05 07:54:15 m72e kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes) >Jul 05 07:54:15 m72e kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes) >Jul 05 07:54:15 m72e kernel: TCP: Hash tables configured (established 65536 bind 65536) >Jul 05 07:54:15 m72e kernel: TCP: reno registered >Jul 05 07:54:15 m72e kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes) >Jul 05 07:54:15 m72e kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes) >Jul 05 07:54:15 m72e kernel: NET: Registered protocol family 1 >Jul 05 07:54:15 m72e kernel: pci 0000:00:02.0: Boot video device >Jul 05 07:54:15 m72e kernel: PCI: CLS 64 bytes, default 64 >Jul 05 07:54:15 m72e kernel: Unpacking initramfs... >Jul 05 07:54:15 m72e kernel: Freeing initrd memory: 29688k freed >Jul 05 07:54:15 m72e kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) >Jul 05 07:54:15 m72e kernel: software IO TLB [mem 0xd161e000-0xd561e000] (64MB) mapped at [ffff95b81161e000-ffff95b81561dfff] >Jul 05 07:54:15 m72e kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 163840 ms ovfl timer >Jul 05 07:54:15 m72e kernel: RAPL PMU: hw unit of domain pp0-core 2^-16 Joules >Jul 05 07:54:15 m72e kernel: RAPL PMU: hw unit of domain package 2^-16 Joules >Jul 05 07:54:15 m72e kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-16 Joules >Jul 05 07:54:15 m72e kernel: sha1_ssse3: Using AVX optimized SHA-1 implementation >Jul 05 07:54:15 m72e kernel: sha256_ssse3: Using AVX optimized SHA-256 implementation >Jul 05 07:54:15 m72e kernel: futex hash table entries: 1024 (order: 4, 65536 bytes) >Jul 05 07:54:15 m72e kernel: Initialise system trusted keyring >Jul 05 07:54:15 m72e kernel: audit: initializing netlink socket (disabled) >Jul 05 07:54:15 m72e kernel: type=2000 audit(1530741253.490:1): initialized >Jul 05 07:54:15 m72e kernel: HugeTLB registered 2 MB page size, pre-allocated 0 pages >Jul 05 07:54:15 m72e kernel: zpool: loaded >Jul 05 07:54:15 m72e kernel: zbud: loaded >Jul 05 07:54:15 m72e kernel: VFS: Disk quotas dquot_6.5.2 >Jul 05 07:54:15 m72e kernel: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) >Jul 05 07:54:15 m72e kernel: msgmni has been set to 15612 >Jul 05 07:54:15 m72e kernel: Key type big_key registered >Jul 05 07:54:15 m72e kernel: SELinux: Registering netfilter hooks >Jul 05 07:54:15 m72e kernel: NET: Registered protocol family 38 >Jul 05 07:54:15 m72e kernel: Key type asymmetric registered >Jul 05 07:54:15 m72e kernel: Asymmetric key parser 'x509' registered >Jul 05 07:54:15 m72e kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 248) >Jul 05 07:54:15 m72e kernel: io scheduler noop registered >Jul 05 07:54:15 m72e kernel: io scheduler deadline registered (default) >Jul 05 07:54:15 m72e kernel: io scheduler cfq registered >Jul 05 07:54:15 m72e kernel: io scheduler mq-deadline registered >Jul 05 07:54:15 m72e kernel: io scheduler kyber registered >Jul 05 07:54:15 m72e kernel: pcieport 0000:00:1c.0: irq 24 for MSI/MSI-X >Jul 05 07:54:15 m72e kernel: pcieport 0000:00:1c.4: irq 25 for MSI/MSI-X >Jul 05 07:54:15 m72e kernel: pcieport 0000:00:1c.5: irq 26 for MSI/MSI-X >Jul 05 07:54:15 m72e kernel: pcieport 0000:00:1c.0: Signaling PME through PCIe PME interrupt >Jul 05 07:54:15 m72e kernel: pcie_pme 0000:00:1c.0:pcie001: service driver pcie_pme loaded >Jul 05 07:54:15 m72e kernel: pcieport 0000:00:1c.4: Signaling PME through PCIe PME interrupt >Jul 05 07:54:15 m72e kernel: pci 0000:02:00.0: Signaling PME through PCIe PME interrupt >Jul 05 07:54:15 m72e kernel: pcie_pme 0000:00:1c.4:pcie001: service driver pcie_pme loaded >Jul 05 07:54:15 m72e kernel: pcieport 0000:00:1c.5: Signaling PME through PCIe PME interrupt >Jul 05 07:54:15 m72e kernel: pci 0000:03:00.0: Signaling PME through PCIe PME interrupt >Jul 05 07:54:15 m72e kernel: pcie_pme 0000:00:1c.5:pcie001: service driver pcie_pme loaded >Jul 05 07:54:15 m72e kernel: pci_hotplug: PCI Hot Plug PCI Core version: 0.5 >Jul 05 07:54:15 m72e kernel: pciehp: PCI Express Hot Plug Controller Driver version: 0.4 >Jul 05 07:54:15 m72e kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 >Jul 05 07:54:15 m72e kernel: intel_idle: MWAIT substates: 0x1120 >Jul 05 07:54:15 m72e kernel: intel_idle: v0.4.1 model 0x3A >Jul 05 07:54:15 m72e kernel: intel_idle: lapic_timer_reliable_states 0xffffffff >Jul 05 07:54:15 m72e kernel: input: Power Button as /devices/LNXSYSTM:00/device:00/PNP0C0C:00/input/input0 >Jul 05 07:54:15 m72e kernel: ACPI: Power Button [PWRB] >Jul 05 07:54:15 m72e kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input1 >Jul 05 07:54:15 m72e kernel: ACPI: Power Button [PWRF] >Jul 05 07:54:15 m72e kernel: ACPI: Requesting acpi_cpufreq >Jul 05 07:54:15 m72e kernel: thermal LNXTHERM:00: registered as thermal_zone0 >Jul 05 07:54:15 m72e kernel: ACPI: Thermal Zone [TZ00] (28 C) >Jul 05 07:54:15 m72e kernel: thermal LNXTHERM:01: registered as thermal_zone1 >Jul 05 07:54:15 m72e kernel: ACPI: Thermal Zone [TZ01] (30 C) >Jul 05 07:54:15 m72e kernel: GHES: HEST is not enabled! >Jul 05 07:54:15 m72e kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled >Jul 05 07:54:15 m72e kernel: Non-volatile memory driver v1.3 >Jul 05 07:54:15 m72e kernel: Linux agpgart interface v0.103 >Jul 05 07:54:15 m72e kernel: crash memory driver: version 1.1 >Jul 05 07:54:15 m72e kernel: rdac: device handler registered >Jul 05 07:54:15 m72e kernel: hp_sw: device handler registered >Jul 05 07:54:15 m72e kernel: emc: device handler registered >Jul 05 07:54:15 m72e kernel: alua: device handler registered >Jul 05 07:54:15 m72e kernel: libphy: Fixed MDIO Bus: probed >Jul 05 07:54:15 m72e kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver >Jul 05 07:54:15 m72e kernel: ehci-pci: EHCI PCI platform driver >Jul 05 07:54:15 m72e kernel: ehci-pci 0000:00:1a.0: EHCI Host Controller >Jul 05 07:54:15 m72e kernel: ehci-pci 0000:00:1a.0: new USB bus registered, assigned bus number 1 >Jul 05 07:54:15 m72e kernel: ehci-pci 0000:00:1a.0: debug port 2 >Jul 05 07:54:15 m72e kernel: ehci-pci 0000:00:1a.0: cache line size of 64 is not supported >Jul 05 07:54:15 m72e kernel: ehci-pci 0000:00:1a.0: irq 16, io mem 0xf7e08000 >Jul 05 07:54:15 m72e kernel: ehci-pci 0000:00:1a.0: USB 2.0 started, EHCI 1.00 >Jul 05 07:54:15 m72e kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002 >Jul 05 07:54:15 m72e kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Jul 05 07:54:15 m72e kernel: usb usb1: Product: EHCI Host Controller >Jul 05 07:54:15 m72e kernel: usb usb1: Manufacturer: Linux 3.10.0-915.el7.x86_64 ehci_hcd >Jul 05 07:54:15 m72e kernel: usb usb1: SerialNumber: 0000:00:1a.0 >Jul 05 07:54:15 m72e kernel: hub 1-0:1.0: USB hub found >Jul 05 07:54:15 m72e kernel: hub 1-0:1.0: 2 ports detected >Jul 05 07:54:15 m72e kernel: ehci-pci 0000:00:1d.0: EHCI Host Controller >Jul 05 07:54:15 m72e kernel: ehci-pci 0000:00:1d.0: new USB bus registered, assigned bus number 2 >Jul 05 07:54:15 m72e kernel: ehci-pci 0000:00:1d.0: debug port 2 >Jul 05 07:54:15 m72e kernel: ehci-pci 0000:00:1d.0: cache line size of 64 is not supported >Jul 05 07:54:15 m72e kernel: ehci-pci 0000:00:1d.0: irq 23, io mem 0xf7e07000 >Jul 05 07:54:15 m72e kernel: ehci-pci 0000:00:1d.0: USB 2.0 started, EHCI 1.00 >Jul 05 07:54:15 m72e kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0002 >Jul 05 07:54:15 m72e kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Jul 05 07:54:15 m72e kernel: usb usb2: Product: EHCI Host Controller >Jul 05 07:54:15 m72e kernel: usb usb2: Manufacturer: Linux 3.10.0-915.el7.x86_64 ehci_hcd >Jul 05 07:54:15 m72e kernel: usb usb2: SerialNumber: 0000:00:1d.0 >Jul 05 07:54:15 m72e kernel: hub 2-0:1.0: USB hub found >Jul 05 07:54:15 m72e kernel: hub 2-0:1.0: 2 ports detected >Jul 05 07:54:15 m72e kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver >Jul 05 07:54:15 m72e kernel: ohci-pci: OHCI PCI platform driver >Jul 05 07:54:15 m72e kernel: uhci_hcd: USB Universal Host Controller Interface driver >Jul 05 07:54:15 m72e kernel: usbcore: registered new interface driver usbserial_generic >Jul 05 07:54:15 m72e kernel: usbserial: USB Serial support registered for generic >Jul 05 07:54:15 m72e kernel: i8042: PNP: No PS/2 controller found. Probing ports directly. >Jul 05 07:54:15 m72e kernel: i8042: No controller found >Jul 05 07:54:15 m72e kernel: tsc: Refined TSC clocksource calibration: 2893.427 MHz >Jul 05 07:54:15 m72e kernel: Switched to clocksource tsc >Jul 05 07:54:15 m72e kernel: mousedev: PS/2 mouse device common for all mice >Jul 05 07:54:15 m72e kernel: rtc_cmos 00:02: RTC can wake from S4 >Jul 05 07:54:15 m72e kernel: rtc_cmos 00:02: rtc core: registered rtc_cmos as rtc0 >Jul 05 07:54:15 m72e kernel: rtc_cmos 00:02: alarms up to one month, y3k, 242 bytes nvram, hpet irqs >Jul 05 07:54:15 m72e kernel: intel_pstate: Intel P-state driver initializing >Jul 05 07:54:15 m72e kernel: cpuidle: using governor menu >Jul 05 07:54:15 m72e kernel: hidraw: raw HID events driver (C) Jiri Kosina >Jul 05 07:54:15 m72e kernel: usbcore: registered new interface driver usbhid >Jul 05 07:54:15 m72e kernel: usbhid: USB HID core driver >Jul 05 07:54:15 m72e kernel: drop_monitor: Initializing network drop monitor service >Jul 05 07:54:15 m72e kernel: TCP: cubic registered >Jul 05 07:54:15 m72e kernel: Initializing XFRM netlink socket >Jul 05 07:54:15 m72e kernel: NET: Registered protocol family 10 >Jul 05 07:54:15 m72e kernel: NET: Registered protocol family 17 >Jul 05 07:54:15 m72e kernel: mpls_gso: MPLS GSO support >Jul 05 07:54:15 m72e kernel: microcode: sig=0x306a9, pf=0x2, revision=0x1f >Jul 05 07:54:15 m72e kernel: microcode: Microcode Update Driver: v2.01 <tigran@aivazian.fsnet.co.uk>, Peter Oruba >Jul 05 07:54:15 m72e kernel: PM: Hibernation image not present or could not be loaded. >Jul 05 07:54:15 m72e kernel: Loading compiled-in X.509 certificates >Jul 05 07:54:15 m72e kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' >Jul 05 07:54:15 m72e kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' >Jul 05 07:54:15 m72e kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: e0f58ecd97127a52c75b58f5bb304d0da16f18cf' >Jul 05 07:54:15 m72e kernel: registered taskstats version 1 >Jul 05 07:54:15 m72e kernel: Key type trusted registered >Jul 05 07:54:15 m72e kernel: Key type encrypted registered >Jul 05 07:54:15 m72e kernel: IMA: No TPM chip found, activating TPM-bypass! (rc=-19) >Jul 05 07:54:15 m72e kernel: Magic number: 10:425:954 >Jul 05 07:54:15 m72e kernel: memory memory7: hash matches >Jul 05 07:54:15 m72e kernel: rtc_cmos 00:02: setting system clock to 2018-07-04 21:54:15 UTC (1530741255) >Jul 05 07:54:15 m72e kernel: Freeing unused kernel memory: 1868k freed >Jul 05 07:54:15 m72e kernel: Write protecting the kernel read-only data: 12288k >Jul 05 07:54:15 m72e kernel: Freeing unused kernel memory: 580k freed >Jul 05 07:54:15 m72e kernel: Freeing unused kernel memory: 616k freed >Jul 05 07:54:15 m72e kernel: random: systemd: uninitialized urandom read (16 bytes read) >Jul 05 07:54:15 m72e kernel: random: systemd: uninitialized urandom read (16 bytes read) >Jul 05 07:54:15 m72e kernel: random: systemd: uninitialized urandom read (16 bytes read) >Jul 05 07:54:15 m72e systemd[1]: systemd 219 running in system mode. (+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 -SECCOMP +BLKID +ELFUTILS +KMOD +IDN) >Jul 05 07:54:15 m72e systemd[1]: Detected architecture x86-64. >Jul 05 07:54:15 m72e systemd[1]: Running in initial RAM disk. >Jul 05 07:54:15 m72e systemd[1]: Set hostname to <m72e>. >Jul 05 07:54:15 m72e kernel: random: systemd: uninitialized urandom read (16 bytes read) >Jul 05 07:54:15 m72e kernel: random: systemd: uninitialized urandom read (16 bytes read) >Jul 05 07:54:15 m72e kernel: random: systemd: uninitialized urandom read (16 bytes read) >Jul 05 07:54:15 m72e kernel: random: systemd: uninitialized urandom read (16 bytes read) >Jul 05 07:54:15 m72e kernel: random: systemd: uninitialized urandom read (16 bytes read) >Jul 05 07:54:15 m72e kernel: random: systemd: uninitialized urandom read (16 bytes read) >Jul 05 07:54:15 m72e kernel: random: systemd: uninitialized urandom read (16 bytes read) >Jul 05 07:54:15 m72e systemd[1]: Reached target Swap. >Jul 05 07:54:15 m72e systemd[1]: Reached target Local File Systems. >Jul 05 07:54:15 m72e systemd[1]: Reached target Timers. >Jul 05 07:54:15 m72e systemd[1]: Created slice Root Slice. >Jul 05 07:54:15 m72e systemd[1]: Created slice System Slice. >Jul 05 07:54:15 m72e systemd[1]: Listening on udev Control Socket. >Jul 05 07:54:15 m72e systemd[1]: Listening on Journal Socket. >Jul 05 07:54:15 m72e systemd[1]: Starting Journal Service... >Jul 05 07:54:15 m72e systemd[1]: Starting dracut cmdline hook... >Jul 05 07:54:15 m72e systemd[1]: Starting Create list of required static device nodes for the current kernel... >Jul 05 07:54:15 m72e systemd[1]: Reached target Slices. >Jul 05 07:54:15 m72e systemd[1]: Starting Setup Virtual Console... >Jul 05 07:54:15 m72e systemd[1]: Starting Apply Kernel Variables... >Jul 05 07:54:15 m72e systemd[1]: Listening on udev Kernel Socket. >Jul 05 07:54:15 m72e systemd[1]: Reached target Sockets. >Jul 05 07:54:15 m72e systemd[1]: Started Create list of required static device nodes for the current kernel. >Jul 05 07:54:15 m72e systemd[1]: Starting Create Static Device Nodes in /dev... >Jul 05 07:54:15 m72e systemd[1]: Started Apply Kernel Variables. >Jul 05 07:54:15 m72e systemd[1]: Started Create Static Device Nodes in /dev. >Jul 05 07:54:15 m72e systemd-journal[103]: Journal started >Jul 05 07:54:15 m72e systemd[1]: Started Journal Service. >Jul 05 07:54:15 m72e systemd[1]: Started Setup Virtual Console. >Jul 05 07:54:15 m72e systemd[1]: Started dracut cmdline hook. >Jul 05 07:54:15 m72e systemd[1]: Starting dracut pre-udev hook... >Jul 05 07:54:15 m72e systemd[1]: Started dracut pre-udev hook. >Jul 05 07:54:15 m72e systemd[1]: Starting udev Kernel Device Manager... >Jul 05 07:54:15 m72e systemd-udevd[219]: starting version 219 >Jul 05 07:54:15 m72e systemd[1]: Started udev Kernel Device Manager. >Jul 05 07:54:15 m72e systemd[1]: Starting udev Coldplug all Devices... >Jul 05 07:54:15 m72e systemd[1]: Mounting Configuration File System... >Jul 05 07:54:15 m72e systemd[1]: Mounted Configuration File System. >Jul 05 07:54:15 m72e systemd[1]: Started udev Coldplug all Devices. >Jul 05 07:54:15 m72e systemd[1]: Reached target System Initialization. >Jul 05 07:54:15 m72e systemd[1]: Starting Show Plymouth Boot Screen... >Jul 05 07:54:15 m72e systemd[1]: Starting dracut initqueue hook... >Jul 05 07:54:15 m72e systemd[1]: Started Show Plymouth Boot Screen. >Jul 05 07:54:15 m72e systemd[1]: Reached target Paths. >Jul 05 07:54:15 m72e systemd[1]: Started Forward Password Requests to Plymouth Directory Watch. >Jul 05 07:54:15 m72e systemd[1]: Reached target Basic System. >Jul 05 07:54:15 m72e kernel: usb 2-1: new high-speed USB device number 2 using ehci-pci >Jul 05 07:54:15 m72e kernel: usb 1-1: new high-speed USB device number 2 using ehci-pci >Jul 05 07:54:15 m72e kernel: r8169 Gigabit Ethernet driver 2.3LK-NAPI loaded >Jul 05 07:54:15 m72e kernel: r8169 0000:03:00.0: irq 27 for MSI/MSI-X >Jul 05 07:54:15 m72e kernel: r8169 0000:03:00.0 eth0: RTL8168e/8111e at 0xffffb34200c6e000, 00:23:24:3c:31:74, XID 0c200000 IRQ 27 >Jul 05 07:54:15 m72e kernel: r8169 0000:03:00.0 eth0: jumbo features [frames: 9200 bytes, tx checksumming: ko] >Jul 05 07:54:15 m72e kernel: libata version 3.00 loaded. >Jul 05 07:54:15 m72e kernel: ahci 0000:00:1f.2: version 3.0 >Jul 05 07:54:15 m72e kernel: ahci 0000:00:1f.2: irq 28 for MSI/MSI-X >Jul 05 07:54:15 m72e kernel: ahci 0000:00:1f.2: AHCI 0001.0300 32 slots 4 ports 3 Gbps 0x1 impl SATA mode >Jul 05 07:54:15 m72e kernel: ahci 0000:00:1f.2: flags: 64bit ncq pm led clo pio slum part ems apst >Jul 05 07:54:15 m72e kernel: scsi host0: ahci >Jul 05 07:54:15 m72e kernel: scsi host1: ahci >Jul 05 07:54:15 m72e kernel: scsi host2: ahci >Jul 05 07:54:15 m72e kernel: scsi host3: ahci >Jul 05 07:54:15 m72e kernel: ata1: SATA max UDMA/133 abar m2048@0xf7e06000 port 0xf7e06100 irq 28 >Jul 05 07:54:15 m72e kernel: ata2: DUMMY >Jul 05 07:54:15 m72e kernel: ata3: DUMMY >Jul 05 07:54:15 m72e kernel: ata4: DUMMY >Jul 05 07:54:15 m72e kernel: usb 1-1: New USB device found, idVendor=8087, idProduct=0024 >Jul 05 07:54:15 m72e kernel: usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 >Jul 05 07:54:15 m72e kernel: usb 2-1: New USB device found, idVendor=8087, idProduct=0024 >Jul 05 07:54:15 m72e kernel: usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 >Jul 05 07:54:15 m72e kernel: hub 1-1:1.0: USB hub found >Jul 05 07:54:15 m72e kernel: hub 1-1:1.0: 4 ports detected >Jul 05 07:54:15 m72e kernel: hub 2-1:1.0: USB hub found >Jul 05 07:54:15 m72e kernel: hub 2-1:1.0: 6 ports detected >Jul 05 07:54:16 m72e kernel: [drm] Replacing VGA console driver >Jul 05 07:54:16 m72e kernel: Console: switching to colour dummy device 80x25 >Jul 05 07:54:16 m72e kernel: i915 0000:00:02.0: irq 29 for MSI/MSI-X >Jul 05 07:54:16 m72e kernel: [drm] Supports vblank timestamp caching Rev 2 (21.10.2013). >Jul 05 07:54:16 m72e kernel: [drm] Driver supports precise vblank timestamp query. >Jul 05 07:54:16 m72e kernel: ata1: SATA link up 3.0 Gbps (SStatus 123 SControl 300) >Jul 05 07:54:16 m72e kernel: ata1.00: ACPI cmd ef/10:06:00:00:00:00 (SET FEATURES) succeeded >Jul 05 07:54:16 m72e kernel: ata1.00: ACPI cmd f5/00:00:00:00:00:00 (SECURITY FREEZE LOCK) filtered out >Jul 05 07:54:16 m72e kernel: ata1.00: ACPI cmd b1/c1:00:00:00:00:00 (DEVICE CONFIGURATION OVERLAY) filtered out >Jul 05 07:54:16 m72e kernel: ata1.00: ATA-8: HITACHI HTS547575A9E384, JE4ZD60D, max UDMA/100 >Jul 05 07:54:16 m72e kernel: ata1.00: 1465149168 sectors, multi 16: LBA48 NCQ (depth 31/32), AA >Jul 05 07:54:16 m72e kernel: ata1.00: ACPI cmd ef/10:06:00:00:00:00 (SET FEATURES) succeeded >Jul 05 07:54:16 m72e kernel: ata1.00: ACPI cmd f5/00:00:00:00:00:00 (SECURITY FREEZE LOCK) filtered out >Jul 05 07:54:16 m72e kernel: ata1.00: ACPI cmd b1/c1:00:00:00:00:00 (DEVICE CONFIGURATION OVERLAY) filtered out >Jul 05 07:54:16 m72e kernel: ata1.00: configured for UDMA/100 >Jul 05 07:54:16 m72e kernel: scsi 0:0:0:0: Direct-Access ATA HITACHI HTS54757 D60D PQ: 0 ANSI: 5 >Jul 05 07:54:16 m72e kernel: vgaarb: device changed decodes: PCI:0000:00:02.0,olddecodes=io+mem,decodes=io+mem:owns=io+mem >Jul 05 07:54:16 m72e kernel: [drm] Initialized i915 1.6.0 20180308 for 0000:00:02.0 on minor 0 >Jul 05 07:54:16 m72e kernel: ACPI: Video Device [GFX0] (multi-head: yes rom: no post: no) >Jul 05 07:54:16 m72e kernel: acpi device:4a: registered as cooling_device9 >Jul 05 07:54:16 m72e kernel: input: Video Bus as /devices/LNXSYSTM:00/device:00/PNP0A08:00/LNXVIDEO:00/input/input2 >Jul 05 07:54:16 m72e kernel: sd 0:0:0:0: [sda] 1465149168 512-byte logical blocks: (750 GB/698 GiB) >Jul 05 07:54:16 m72e kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks >Jul 05 07:54:16 m72e kernel: sd 0:0:0:0: [sda] Write Protect is off >Jul 05 07:54:16 m72e kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 >Jul 05 07:54:16 m72e kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA >Jul 05 07:54:16 m72e kernel: sda: sda1 sda2 sda3 sda4 < sda5 > >Jul 05 07:54:16 m72e kernel: sd 0:0:0:0: [sda] Attached SCSI disk >Jul 05 07:54:16 m72e kernel: usb 2-1.4: new full-speed USB device number 3 using ehci-pci >Jul 05 07:54:16 m72e kernel: fbcon: inteldrmfb (fb0) is primary device >Jul 05 07:54:16 m72e kernel: usb 2-1.4: New USB device found, idVendor=045e, idProduct=07a5 >Jul 05 07:54:16 m72e kernel: usb 2-1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 >Jul 05 07:54:16 m72e kernel: usb 2-1.4: Product: Microsoft® 2.4GHz Transceiver v9.0 >Jul 05 07:54:16 m72e kernel: usb 2-1.4: Manufacturer: Microsoft >Jul 05 07:54:16 m72e kernel: input: Microsoft Microsoft® 2.4GHz Transceiver v9.0 as /devices/pci0000:00/0000:00:1d.0/usb2/2-1/2-1.4/2-1.4:1.0/input/input3 >Jul 05 07:54:16 m72e kernel: hid-generic 0003:045E:07A5.0001: input,hidraw0: USB HID v1.11 Keyboard [Microsoft Microsoft® 2.4GHz Transceiver v9.0] on usb-0000:00:1d.0-1.4/input0 >Jul 05 07:54:16 m72e kernel: input: Microsoft Microsoft® 2.4GHz Transceiver v9.0 as /devices/pci0000:00/0000:00:1d.0/usb2/2-1/2-1.4/2-1.4:1.1/input/input4 >Jul 05 07:54:16 m72e kernel: hid-generic 0003:045E:07A5.0002: input,hidraw1: USB HID v1.11 Mouse [Microsoft Microsoft® 2.4GHz Transceiver v9.0] on usb-0000:00:1d.0-1.4/input1 >Jul 05 07:54:16 m72e kernel: input: Microsoft Microsoft® 2.4GHz Transceiver v9.0 as /devices/pci0000:00/0000:00:1d.0/usb2/2-1/2-1.4/2-1.4:1.2/input/input5 >Jul 05 07:54:16 m72e kernel: Console: switching to colour frame buffer device 240x75 >Jul 05 07:54:16 m72e kernel: i915 0000:00:02.0: fb0: inteldrmfb frame buffer device >Jul 05 07:54:16 m72e kernel: hid-generic 0003:045E:07A5.0003: input,hidraw2: USB HID v1.11 Device [Microsoft Microsoft® 2.4GHz Transceiver v9.0] on usb-0000:00:1d.0-1.4/input2 >Jul 05 07:54:16 m72e kernel: usb 2-1.5: new full-speed USB device number 4 using ehci-pci >Jul 05 07:54:16 m72e kernel: usb 2-1.5: device descriptor read/64, error -32 >Jul 05 07:54:16 m72e kernel: random: fast init done >Jul 05 07:54:16 m72e kernel: usb 2-1.5: device descriptor read/64, error -32 >Jul 05 07:54:16 m72e systemd[1]: Found device HITACHI_HTS547575A9E384 2. >Jul 05 07:54:16 m72e systemd[1]: Starting File System Check on /dev/disk/by-uuid/88fb118c-3789-49c4-b13c-ea45edba3a9b... >Jul 05 07:54:16 m72e kernel: usb 2-1.5: new full-speed USB device number 5 using ehci-pci >Jul 05 07:54:16 m72e systemd-fsck[293]: /sbin/fsck.xfs: XFS file system. >Jul 05 07:54:16 m72e systemd[1]: Started File System Check on /dev/disk/by-uuid/88fb118c-3789-49c4-b13c-ea45edba3a9b. >Jul 05 07:54:16 m72e kernel: usb 2-1.5: device descriptor read/64, error -32 >Jul 05 07:54:16 m72e systemd[1]: Started dracut initqueue hook. >Jul 05 07:54:16 m72e systemd[1]: Reached target Remote File Systems (Pre). >Jul 05 07:54:16 m72e systemd[1]: Reached target Remote File Systems. >Jul 05 07:54:16 m72e systemd[1]: Mounting /sysroot... >Jul 05 07:54:17 m72e kernel: usb 2-1.5: device descriptor read/64, error -32 >Jul 05 07:54:17 m72e kernel: SGI XFS with ACLs, security attributes, no debug enabled >Jul 05 07:54:17 m72e kernel: XFS (sda2): Mounting V4 Filesystem >Jul 05 07:54:17 m72e kernel: usb 2-1-port5: attempt power cycle >Jul 05 07:54:17 m72e kernel: XFS (sda2): Ending clean mount >Jul 05 07:54:17 m72e systemd[1]: Mounted /sysroot. >Jul 05 07:54:17 m72e systemd[1]: Reached target Initrd Root File System. >Jul 05 07:54:17 m72e systemd[1]: Starting Reload Configuration from the Real Root... >Jul 05 07:54:17 m72e systemd[1]: Reloading. >Jul 05 07:54:17 m72e kernel: random: crng init done >Jul 05 07:54:17 m72e systemd[1]: Started Reload Configuration from the Real Root. >Jul 05 07:54:17 m72e systemd[1]: Reached target Initrd File Systems. >Jul 05 07:54:17 m72e systemd[1]: Reached target Initrd Default Target. >Jul 05 07:54:17 m72e systemd[1]: Starting dracut pre-pivot and cleanup hook... >Jul 05 07:54:17 m72e systemd[1]: Started dracut pre-pivot and cleanup hook. >Jul 05 07:54:17 m72e systemd[1]: Starting Cleaning Up and Shutting Down Daemons... >Jul 05 07:54:17 m72e systemd[1]: Stopped target Timers. >Jul 05 07:54:17 m72e systemd[1]: Starting Plymouth switch root service... >Jul 05 07:54:17 m72e systemd[1]: Stopped Cleaning Up and Shutting Down Daemons. >Jul 05 07:54:17 m72e systemd[1]: Stopped dracut pre-pivot and cleanup hook. >Jul 05 07:54:17 m72e systemd[1]: Stopped target Remote File Systems. >Jul 05 07:54:17 m72e systemd[1]: Stopped target Remote File Systems (Pre). >Jul 05 07:54:17 m72e systemd[1]: Stopped dracut initqueue hook. >Jul 05 07:54:17 m72e systemd[1]: Stopped target Initrd Default Target. >Jul 05 07:54:17 m72e systemd[1]: Stopped target Basic System. >Jul 05 07:54:17 m72e systemd[1]: Stopped target Slices. >Jul 05 07:54:17 m72e systemd[1]: Stopped target System Initialization. >Jul 05 07:54:17 m72e systemd[1]: Stopped Apply Kernel Variables. >Jul 05 07:54:17 m72e systemd[1]: Stopped target Local File Systems. >Jul 05 07:54:17 m72e systemd[1]: Stopping udev Kernel Device Manager... >Jul 05 07:54:17 m72e systemd[1]: Stopped udev Coldplug all Devices. >Jul 05 07:54:17 m72e systemd[1]: Stopped target Swap. >Jul 05 07:54:17 m72e systemd[1]: Stopped target Sockets. >Jul 05 07:54:17 m72e systemd[1]: Stopped target Paths. >Jul 05 07:54:17 m72e systemd[1]: Stopped udev Kernel Device Manager. >Jul 05 07:54:17 m72e systemd[1]: Stopped Create Static Device Nodes in /dev. >Jul 05 07:54:17 m72e systemd[1]: Stopped Create list of required static device nodes for the current kernel. >Jul 05 07:54:17 m72e systemd[1]: Stopped dracut pre-udev hook. >Jul 05 07:54:17 m72e systemd[1]: Stopped dracut cmdline hook. >Jul 05 07:54:17 m72e systemd[1]: Closed udev Control Socket. >Jul 05 07:54:17 m72e systemd[1]: Closed udev Kernel Socket. >Jul 05 07:54:17 m72e systemd[1]: Starting Cleanup udevd DB... >Jul 05 07:54:17 m72e systemd[1]: Started Cleanup udevd DB. >Jul 05 07:54:17 m72e systemd[1]: Reached target Switch Root. >Jul 05 07:54:17 m72e systemd[1]: Started Plymouth switch root service. >Jul 05 07:54:17 m72e systemd[1]: Starting Switch Root... >Jul 05 07:54:17 m72e systemd[1]: Switching root. >Jul 05 07:54:17 m72e systemd-journal[103]: Journal stopped >Jul 05 07:54:23 m72e systemd-journal[386]: Runtime journal is using 8.0M (max allowed 390.4M, trying to leave 585.6M free of 3.8G available â current limit 390.4M). >Jul 05 07:54:23 m72e systemd-journald[103]: Received SIGTERM from PID 1 (systemd). >Jul 05 07:54:23 m72e kernel: usb 2-1.5: new full-speed USB device number 6 using ehci-pci >Jul 05 07:54:23 m72e kernel: usb 2-1.5: device not accepting address 6, error -32 >Jul 05 07:54:23 m72e kernel: usb 2-1.5: new full-speed USB device number 7 using ehci-pci >Jul 05 07:54:23 m72e kernel: type=1404 audit(1530741258.569:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 >Jul 05 07:54:23 m72e kernel: usb 2-1.5: device not accepting address 7, error -32 >Jul 05 07:54:23 m72e kernel: usb 2-1-port5: unable to enumerate USB device >Jul 05 07:54:23 m72e kernel: SELinux: 2048 avtab hash slots, 111387 rules. >Jul 05 07:54:23 m72e kernel: SELinux: 2048 avtab hash slots, 111387 rules. >Jul 05 07:54:23 m72e kernel: SELinux: 8 users, 14 roles, 5022 types, 314 bools, 1 sens, 1024 cats >Jul 05 07:54:23 m72e kernel: SELinux: 129 classes, 111387 rules >Jul 05 07:54:23 m72e kernel: SELinux: Completing initialization. >Jul 05 07:54:23 m72e kernel: SELinux: Setting up existing superblocks. >Jul 05 07:54:23 m72e kernel: type=1403 audit(1530741258.749:3): policy loaded auid=4294967295 ses=4294967295 >Jul 05 07:54:23 m72e systemd[1]: Successfully loaded SELinux policy in 212.741ms. >Jul 05 07:54:23 m72e kernel: ip_tables: (C) 2000-2006 Netfilter Core Team >Jul 05 07:54:23 m72e systemd[1]: Inserted module 'ip_tables' >Jul 05 07:54:23 m72e systemd[1]: Relabelled /dev, /run and /sys/fs/cgroup in 22.477ms. >Jul 05 07:54:23 m72e kernel: type=1400 audit(1530741263.003:4): avc: denied { map } for pid=395 comm="systemd-readahe" path="/run/systemd/readahead/shared" dev="tmpfs" ino=14470 scontext=system_u:system_r:readahead_t:s0 tcontext=system_u:object_r:readahead_var_run_t:s0 tclass=file permissive=0 >Jul 05 07:54:23 m72e systemd-readahead[395]: Failed to mmap shared memory segment: Permission denied >Jul 05 07:54:23 m72e kernel: type=1400 audit(1530741263.004:5): avc: denied { map } for pid=396 comm="systemd-readahe" path="/run/systemd/readahead/shared" dev="tmpfs" ino=14470 scontext=system_u:system_r:readahead_t:s0 tcontext=system_u:object_r:readahead_var_run_t:s0 tclass=file permissive=0 >Jul 05 07:54:23 m72e systemd-readahead[396]: Failed to mmap shared memory segment: Permission denied >Jul 05 07:54:23 m72e systemd-journal[386]: Journal started >Jul 05 07:54:19 m72e systemd[1]: systemd 219 running in system mode. (+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 -SECCOMP +BLKID +ELFUTILS +KMOD +IDN) >Jul 05 07:54:19 m72e systemd[1]: Detected architecture x86-64. >Jul 05 07:54:19 m72e systemd[1]: Set hostname to <m72e>. >Jul 05 07:54:23 m72e systemd[1]: Starting Flush Journal to Persistent Storage... >Jul 05 07:54:23 m72e systemd[1]: Started udev Coldplug all Devices. >Jul 05 07:54:23 m72e systemd[1]: Starting udev Wait for Complete Device Initialization... >Jul 05 07:54:23 m72e systemd[1]: Started Apply Kernel Variables. >Jul 05 07:54:23 m72e systemd[1]: Started Flush Journal to Persistent Storage. >Jul 05 07:54:23 m72e systemd[1]: Started LVM2 metadata daemon. >Jul 05 07:54:24 m72e systemd[1]: Started Configure read-only root support. >Jul 05 07:54:24 m72e systemd[1]: Starting Load/Save Random Seed... >Jul 05 07:54:24 m72e systemd[1]: Started Load/Save Random Seed. >Jul 05 07:54:24 m72e systemd[1]: Started Create Static Device Nodes in /dev. >Jul 05 07:54:24 m72e systemd[1]: Starting udev Kernel Device Manager... >Jul 05 07:54:24 m72e systemd-udevd[428]: starting version 219 >Jul 05 07:54:24 m72e systemd-udevd[428]: unknown key 'SYSFS{idVendor}' in /etc/udev/rules.d/65-brother-libsane-type1-inst.rules:14 >Jul 05 07:54:24 m72e systemd-udevd[428]: invalid rule '/etc/udev/rules.d/65-brother-libsane-type1-inst.rules:14' >Jul 05 07:54:25 m72e systemd[1]: Started udev Kernel Device Manager. >Jul 05 07:54:25 m72e kernel: ACPI Warning: SystemIO range 0x0000000000000428-0x000000000000042f conflicts with OpRegion 0x0000000000000400-0x000000000000047f (\PMIO) (20130517/utaddress-254) >Jul 05 07:54:25 m72e kernel: ACPI: If an ACPI driver is available for this device, you should use it instead of the native driver >Jul 05 07:54:25 m72e kernel: ACPI Warning: SystemIO range 0x0000000000000540-0x000000000000054f conflicts with OpRegion 0x0000000000000500-0x0000000000000563 (\GPIO) (20130517/utaddress-254) >Jul 05 07:54:25 m72e kernel: ACPI: If an ACPI driver is available for this device, you should use it instead of the native driver >Jul 05 07:54:25 m72e kernel: ACPI Warning: SystemIO range 0x0000000000000530-0x000000000000053f conflicts with OpRegion 0x0000000000000500-0x0000000000000563 (\GPIO) (20130517/utaddress-254) >Jul 05 07:54:25 m72e kernel: ACPI: If an ACPI driver is available for this device, you should use it instead of the native driver >Jul 05 07:54:25 m72e kernel: ACPI Warning: SystemIO range 0x0000000000000500-0x000000000000052f conflicts with OpRegion 0x0000000000000500-0x0000000000000563 (\GPIO) (20130517/utaddress-254) >Jul 05 07:54:25 m72e kernel: ACPI: If an ACPI driver is available for this device, you should use it instead of the native driver >Jul 05 07:54:25 m72e kernel: lpc_ich: Resource conflict(s) found affecting gpio_ich >Jul 05 07:54:25 m72e kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt >Jul 05 07:54:25 m72e systemd[1]: Created slice system-systemd\x2dbacklight.slice. >Jul 05 07:54:25 m72e systemd[1]: Starting Load/Save Screen Backlight Brightness of backlight:acpi_video0... >Jul 05 07:54:26 m72e systemd[1]: Started Load/Save Screen Backlight Brightness of backlight:acpi_video0. >Jul 05 07:54:26 m72e kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 >Jul 05 07:54:26 m72e kernel: mei_me 0000:00:16.0: irq 30 for MSI/MSI-X >Jul 05 07:54:26 m72e kernel: sd 0:0:0:0: Attached scsi generic sg0 type 0 >Jul 05 07:54:26 m72e kernel: iTCO_vendor_support: vendor-support=0 >Jul 05 07:54:26 m72e kernel: iTCO_wdt: Intel TCO WatchDog Timer Driver v1.11 >Jul 05 07:54:26 m72e kernel: iTCO_wdt: Found a Cougar Point TCO device (Version=2, TCOBASE=0x0460) >Jul 05 07:54:26 m72e kernel: iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) >Jul 05 07:54:26 m72e kernel: Intel(R) Wireless WiFi driver for Linux >Jul 05 07:54:26 m72e kernel: Copyright(c) 2003- 2015 Intel Corporation >Jul 05 07:54:26 m72e kernel: iwlwifi 0000:02:00.0: irq 31 for MSI/MSI-X >Jul 05 07:54:26 m72e mtp-probe[461]: checking bus 2, device 3: "/sys/devices/pci0000:00/0000:00:1d.0/usb2/2-1/2-1.4" >Jul 05 07:54:26 m72e mtp-probe[461]: bus: 2, device: 3 was not an MTP device >Jul 05 07:54:26 m72e kernel: iwlwifi 0000:02:00.0: loaded firmware version 18.168.6.1 op_mode iwldvm >Jul 05 07:54:26 m72e kernel: snd_hda_intel 0000:00:1b.0: bound 0000:00:02.0 (ops i915_audio_component_bind_ops [i915]) >Jul 05 07:54:26 m72e kernel: cryptd: max_cpu_qlen set to 1000 >Jul 05 07:54:27 m72e kernel: iwlwifi 0000:02:00.0: CONFIG_IWLWIFI_DEBUG disabled >Jul 05 07:54:27 m72e kernel: iwlwifi 0000:02:00.0: CONFIG_IWLWIFI_DEBUGFS enabled >Jul 05 07:54:27 m72e kernel: iwlwifi 0000:02:00.0: CONFIG_IWLWIFI_DEVICE_TRACING disabled >Jul 05 07:54:27 m72e kernel: iwlwifi 0000:02:00.0: Detected Intel(R) Centrino(R) Wireless-N 2230 BGN, REV=0xC8 >Jul 05 07:54:27 m72e kernel: snd_hda_intel 0000:00:1b.0: irq 32 for MSI/MSI-X >Jul 05 07:54:27 m72e kernel: AVX version of gcm_enc/dec engaged. >Jul 05 07:54:27 m72e kernel: AES CTR mode by8 optimization enabled >Jul 05 07:54:27 m72e kernel: alg: No test for __gcm-aes-aesni (__driver-gcm-aes-aesni) >Jul 05 07:54:27 m72e kernel: alg: No test for __generic-gcm-aes-aesni (__driver-generic-gcm-aes-aesni) >Jul 05 07:54:27 m72e kernel: snd_hda_codec_realtek hdaudioC0D2: autoconfig for ALC662 rev3: line_outs=1 (0x15/0x0/0x0/0x0/0x0) type:speaker >Jul 05 07:54:27 m72e kernel: snd_hda_codec_realtek hdaudioC0D2: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) >Jul 05 07:54:27 m72e kernel: snd_hda_codec_realtek hdaudioC0D2: hp_outs=1 (0x1b/0x0/0x0/0x0/0x0) >Jul 05 07:54:27 m72e kernel: snd_hda_codec_realtek hdaudioC0D2: mono: mono_out=0x0 >Jul 05 07:54:27 m72e kernel: snd_hda_codec_realtek hdaudioC0D2: inputs: >Jul 05 07:54:27 m72e kernel: snd_hda_codec_realtek hdaudioC0D2: Mic=0x19 >Jul 05 07:54:27 m72e kernel: input: HDA Intel PCH Mic as /devices/pci0000:00/0000:00:1b.0/sound/card0/input7 >Jul 05 07:54:27 m72e kernel: input: HDA Intel PCH Front Headphone as /devices/pci0000:00/0000:00:1b.0/sound/card0/input8 >Jul 05 07:54:27 m72e kernel: input: HDA Intel PCH HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:1b.0/sound/card0/input9 >Jul 05 07:54:27 m72e crda[532]: setting regulatory domain to AU based on timezone (Australia/Brisbane) >Jul 05 07:54:27 m72e kernel: ieee80211 phy0: Selected rate control algorithm 'iwl-agn-rs' >Jul 05 07:54:27 m72e kernel: intel_rapl: Found RAPL domain package >Jul 05 07:54:27 m72e kernel: intel_rapl: Found RAPL domain core >Jul 05 07:54:27 m72e kernel: intel_rapl: Found RAPL domain uncore >Jul 05 07:54:27 m72e kernel: intel_rapl: RAPL package 0 domain package locked by BIOS >Jul 05 07:54:27 m72e systemd[1]: Created slice system-systemd\x2drfkill.slice. >Jul 05 07:54:27 m72e systemd[1]: Starting Load/Save RF Kill Switch Status of rfkill0... >Jul 05 07:54:27 m72e systemd[1]: Started Load/Save RF Kill Switch Status of rfkill0. >Jul 05 07:54:28 m72e systemd[1]: Found device HITACHI_HTS547575A9E384 3. >Jul 05 07:54:28 m72e systemd[1]: Activating swap /dev/disk/by-uuid/c2e6e676-a3dd-458a-9646-3774f6953996... >Jul 05 07:54:28 m72e systemd[1]: Found device HITACHI_HTS547575A9E384 1. >Jul 05 07:54:28 m72e kernel: Adding 8388604k swap on /dev/sda3. Priority:-1 extents:1 across:8388604k FS >Jul 05 07:54:28 m72e systemd[1]: Activated swap /dev/disk/by-uuid/c2e6e676-a3dd-458a-9646-3774f6953996. >Jul 05 07:54:28 m72e systemd[1]: Reached target Swap. >Jul 05 07:54:28 m72e systemd[1]: Started udev Wait for Complete Device Initialization. >Jul 05 07:54:28 m72e systemd[1]: Starting Activation of DM RAID sets... >Jul 05 07:54:28 m72e systemd[1]: Created slice system-lvm2\x2dpvscan.slice. >Jul 05 07:54:28 m72e systemd[1]: Starting LVM2 PV scan on device 8:5... >Jul 05 07:54:28 m72e lvm[556]: WARNING: lvmetad is being updated, retrying (setup) for 10 more seconds. >Jul 05 07:54:28 m72e kernel: device-mapper: uevent: version 1.0.3 >Jul 05 07:54:28 m72e kernel: device-mapper: ioctl: 4.37.1-ioctl (2018-04-03) initialised: dm-devel@redhat.com >Jul 05 07:54:28 m72e systemd[1]: Started Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. >Jul 05 07:54:28 m72e systemd[1]: Reached target Local File Systems (Pre). >Jul 05 07:54:28 m72e systemd[1]: Starting File System Check on /dev/disk/by-uuid/fffaf68c-58be-45a3-ba54-df1673836a38... >Jul 05 07:54:28 m72e systemd[1]: Started Activation of DM RAID sets. >Jul 05 07:54:29 m72e systemd-fsck[565]: /dev/sda1: clean, 463/262144 files, 169726/1048576 blocks >Jul 05 07:54:29 m72e systemd[1]: Started File System Check on /dev/disk/by-uuid/fffaf68c-58be-45a3-ba54-df1673836a38. >Jul 05 07:54:29 m72e systemd[1]: Mounting /boot... >Jul 05 07:54:29 m72e kernel: EXT4-fs (sda1): mounted filesystem with ordered data mode. Opts: (null) >Jul 05 07:54:29 m72e systemd[1]: Mounted /boot. >Jul 05 07:54:30 m72e systemd[1]: Found device /dev/disk/by-uuid/92c7513b-37b3-47b2-961a-914f0ec4841c. >Jul 05 07:54:30 m72e systemd[1]: Starting Cryptography Setup for luks-92c7513b-37b3-47b2-961a-914f0ec4841c... >Jul 05 07:54:30 m72e systemd[1]: Starting Activation of DM RAID sets... >Jul 05 07:54:30 m72e systemd[1]: Started Forward Password Requests to Plymouth. >Jul 05 07:54:30 m72e systemd[1]: Started Activation of DM RAID sets. >Jul 05 07:54:30 m72e systemd[1]: Found device /dev/mapper/lvmvg-virt. >Jul 05 07:54:30 m72e systemd[1]: Starting File System Check on /dev/mapper/lvmvg-virt... >Jul 05 07:54:30 m72e lvm[556]: 3 logical volume(s) in volume group "lvmvg" now active >Jul 05 07:54:30 m72e systemd[1]: Found device /dev/mapper/lvmvg-HOME. >Jul 05 07:54:30 m72e systemd[1]: Starting File System Check on /dev/mapper/lvmvg-HOME... >Jul 05 07:54:30 m72e systemd[1]: Started LVM2 PV scan on device 8:5. >Jul 05 07:54:31 m72e systemd-fsck[601]: /dev/mapper/lvmvg-virt: clean, 1090648/25600000 files, 44042950/102400000 blocks >Jul 05 07:54:31 m72e systemd-fsck[605]: /dev/mapper/lvmvg-HOME: clean, 1191811/6406144 files, 22593377/25600000 blocks >Jul 05 07:54:31 m72e systemd[1]: Started File System Check on /dev/mapper/lvmvg-virt. >Jul 05 07:54:31 m72e systemd[1]: Started File System Check on /dev/mapper/lvmvg-HOME. >Jul 05 07:54:31 m72e systemd[1]: Mounting /home... >Jul 05 07:54:31 m72e kernel: EXT4-fs (dm-0): mounted filesystem with ordered data mode. Opts: (null) >Jul 05 07:54:31 m72e systemd[1]: Mounted /home. >Jul 05 07:54:31 m72e systemd[1]: Mounting /home/virt... >Jul 05 07:54:31 m72e kernel: EXT4-fs (dm-1): mounted filesystem with ordered data mode. Opts: (null) >Jul 05 07:54:31 m72e systemd[1]: Mounted /home/virt. >Jul 05 07:54:31 m72e systemd[1]: Reached target Local File Systems. >Jul 05 07:54:31 m72e systemd[1]: Starting Import network configuration from initramfs... >Jul 05 07:54:31 m72e systemd[1]: Starting Tell Plymouth To Write Out Runtime Data... >Jul 05 07:54:31 m72e systemd[1]: Starting Preprocess NFS configuration... >Jul 05 07:54:32 m72e systemd[1]: Started Preprocess NFS configuration. >Jul 05 07:54:32 m72e systemd[1]: Started Import network configuration from initramfs. >Jul 05 07:54:32 m72e systemd[1]: Starting Create Volatile Files and Directories... >Jul 05 07:54:32 m72e systemd[1]: Starting Activation of DM RAID sets... >Jul 05 07:54:32 m72e systemd[1]: Started Activation of DM RAID sets. >Jul 05 07:54:32 m72e systemd[1]: Started Create Volatile Files and Directories. >Jul 05 07:54:32 m72e systemd[1]: Mounting RPC Pipe File System... >Jul 05 07:54:32 m72e systemd[1]: Starting Security Auditing Service... >Jul 05 07:54:33 m72e kernel: RPC: Registered named UNIX socket transport module. >Jul 05 07:54:33 m72e kernel: RPC: Registered udp transport module. >Jul 05 07:54:33 m72e kernel: RPC: Registered tcp transport module. >Jul 05 07:54:33 m72e kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. >Jul 05 07:54:33 m72e systemd[1]: Mounted RPC Pipe File System. >Jul 05 07:54:33 m72e systemd[1]: Reached target rpc_pipefs.target. >Jul 05 07:54:33 m72e auditd[657]: Started dispatcher: /sbin/audispd pid: 659 >Jul 05 07:54:33 m72e kernel: type=1305 audit(1530741273.651:6): audit_pid=657 old=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 >Jul 05 07:54:33 m72e audispd[659]: audispd initialized with q_depth=250 and 1 active plugins >Jul 05 07:54:33 m72e auditd[657]: Init complete, auditd 2.8.4 listening for events (startup state enable) >Jul 05 07:54:34 m72e augenrules[663]: /sbin/augenrules: No change >Jul 05 07:54:34 m72e augenrules[663]: No rules >Jul 05 07:54:34 m72e augenrules[663]: enabled 1 >Jul 05 07:54:34 m72e augenrules[663]: failure 1 >Jul 05 07:54:34 m72e augenrules[663]: pid 657 >Jul 05 07:54:34 m72e augenrules[663]: rate_limit 0 >Jul 05 07:54:34 m72e augenrules[663]: backlog_limit 320 >Jul 05 07:54:34 m72e augenrules[663]: lost 0 >Jul 05 07:54:34 m72e augenrules[663]: backlog 0 >Jul 05 07:54:34 m72e systemd[1]: Started Security Auditing Service. >Jul 05 07:54:34 m72e systemd[1]: Starting Update UTMP about System Boot/Shutdown... >Jul 05 07:54:34 m72e systemd[1]: Started Update UTMP about System Boot/Shutdown. >Jul 05 07:54:36 m72e systemd[1]: Received SIGRTMIN+20 from PID 238 (plymouthd). >Jul 05 07:54:36 m72e systemd[1]: Started Tell Plymouth To Write Out Runtime Data. >Jul 05 07:54:40 m72e systemd-cryptsetup[591]: Set cipher aes, mode cbc-essiv:sha256, key size 256 bits for device /dev/disk/by-uuid/92c7513b-37b3-47b2-961a-914f0ec4841c. >Jul 05 07:54:41 m72e kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) >Jul 05 07:54:42 m72e systemd[1]: Started Cryptography Setup for luks-92c7513b-37b3-47b2-961a-914f0ec4841c. >Jul 05 07:54:42 m72e systemd[1]: Reached target Local Encrypted Volumes. >Jul 05 07:54:42 m72e systemd[1]: Reached target System Initialization. >Jul 05 07:54:42 m72e systemd[1]: Listening on RPCbind Server Activation Socket. >Jul 05 07:54:42 m72e systemd[1]: Listening on Virtual machine log manager socket. >Jul 05 07:54:42 m72e systemd[1]: Started Flexible branding. >Jul 05 07:54:42 m72e systemd[1]: Listening on CUPS Printing Service Sockets. >Jul 05 07:54:42 m72e systemd[1]: Listening on D-Bus System Message Bus Socket. >Jul 05 07:54:42 m72e systemd[1]: Listening on Avahi mDNS/DNS-SD Stack Activation Socket. >Jul 05 07:54:42 m72e systemd[1]: Listening on Open-iSCSI iscsid Socket. >Jul 05 07:54:42 m72e systemd[1]: Listening on Open-iSCSI iscsiuio Socket. >Jul 05 07:54:42 m72e systemd[1]: Started Daily Cleanup of Temporary Directories. >Jul 05 07:54:42 m72e systemd[1]: Reached target Timers. >Jul 05 07:54:42 m72e systemd[1]: Started CUPS Printer Service Spool. >Jul 05 07:54:42 m72e systemd[1]: Reached target Paths. >Jul 05 07:54:42 m72e systemd[1]: Listening on Virtual machine lock manager socket. >Jul 05 07:54:42 m72e systemd[1]: Reached target Sockets. >Jul 05 07:54:42 m72e systemd[1]: Reached target Basic System. >Jul 05 07:54:42 m72e systemd[1]: Starting GSSAPI Proxy Daemon... >Jul 05 07:54:42 m72e systemd[1]: Starting Kernel Samepage Merging... >Jul 05 07:54:42 m72e systemd[1]: Starting Load CPU microcode update... >Jul 05 07:54:42 m72e systemd[1]: Started D-Bus System Message Bus. >Jul 05 07:54:43 m72e systemd[1]: Started irqbalance daemon. >Jul 05 07:54:43 m72e systemd[1]: Starting Resets System Activity Logs... >Jul 05 07:54:43 m72e systemd[1]: Starting RealtimeKit Scheduling Policy Service... >Jul 05 07:54:43 m72e systemd[1]: Starting Authorization Manager... >Jul 05 07:54:43 m72e systemd[1]: Started Manage Sound Card State (restore and store). >Jul 05 07:54:43 m72e systemd[1]: Starting Modem Manager... >Jul 05 07:54:43 m72e alsactl[772]: alsactl 1.1.6 daemon started >Jul 05 07:54:43 m72e systemd[1]: Starting Login Service... >Jul 05 07:54:43 m72e systemd[1]: Started libstoragemgmt plug-in server daemon. >Jul 05 07:54:43 m72e systemd[1]: Starting Dump dmesg to /var/log/dmesg... >Jul 05 07:54:43 m72e systemd[1]: Starting Accounts Service... >Jul 05 07:54:43 m72e systemd[1]: Started Hardware RNG Entropy Gatherer Daemon. >Jul 05 07:54:44 m72e rtkit-daemon[770]: Successfully called chroot. >Jul 05 07:54:44 m72e rtkit-daemon[770]: Successfully dropped privileges. >Jul 05 07:54:44 m72e rtkit-daemon[770]: Successfully limited resources. >Jul 05 07:54:44 m72e rtkit-daemon[770]: Running. >Jul 05 07:54:44 m72e rtkit-daemon[770]: Canary thread running. >Jul 05 07:54:44 m72e rtkit-daemon[770]: Watchdog thread running. >Jul 05 07:54:44 m72e rngd[778]: Failed to init entropy source 0: Hardware RNG Device >Jul 05 07:54:44 m72e rngd[778]: Failed to init entropy source 1: TPM RNG Device >Jul 05 07:54:44 m72e systemd[1]: Started Self Monitoring and Reporting Technology (SMART) Daemon. >Jul 05 07:54:44 m72e systemd[1]: Starting Avahi mDNS/DNS-SD Stack... >Jul 05 07:54:44 m72e systemd[1]: Reached target Sound Card. >Jul 05 07:54:44 m72e systemd[1]: Starting NTP client/server... >Jul 05 07:54:44 m72e systemd[1]: Started ABRT Automated Bug Reporting Tool. >Jul 05 07:54:44 m72e systemd[1]: Started ABRT Xorg log watcher. >Jul 05 07:54:44 m72e systemd[1]: Started ABRT kernel log watcher. >Jul 05 07:54:44 m72e systemd[1]: Starting Install ABRT coredump hook... >Jul 05 07:54:44 m72e systemd[1]: Starting Virtual Machine and Container Registration Service... >Jul 05 07:54:44 m72e systemd[1]: Starting Rollback uncommitted netcf network config change transactions... >Jul 05 07:54:44 m72e systemd[1]: Started GSSAPI Proxy Daemon. >Jul 05 07:54:44 m72e systemd[1]: Started Kernel Samepage Merging. >Jul 05 07:54:44 m72e systemd[1]: Started Load CPU microcode update. >Jul 05 07:54:44 m72e systemd[1]: Started Resets System Activity Logs. >Jul 05 07:54:44 m72e systemd[1]: Started Dump dmesg to /var/log/dmesg. >Jul 05 07:54:44 m72e systemd[1]: Started RealtimeKit Scheduling Policy Service. >Jul 05 07:54:44 m72e systemd[1]: Starting Kernel Samepage Merging (KSM) Tuning Daemon... >Jul 05 07:54:44 m72e systemd-logind[774]: New seat seat0. >Jul 05 07:54:44 m72e systemd[1]: Reached target NFS client services. >Jul 05 07:54:44 m72e systemd[1]: Started Login Service. >Jul 05 07:54:44 m72e systemd-logind[774]: Watching system buttons on /dev/input/event1 (Power Button) >Jul 05 07:54:44 m72e systemd-logind[774]: Watching system buttons on /dev/input/event2 (Video Bus) >Jul 05 07:54:44 m72e systemd-logind[774]: Watching system buttons on /dev/input/event0 (Power Button) >Jul 05 07:54:44 m72e chronyd[811]: chronyd version 3.2 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SECHASH +SIGND +ASYNCDNS +IPV6 +DEBUG) >Jul 05 07:54:45 m72e netcf-transaction.sh[801]: Running start: No pending transaction to rollback >Jul 05 07:54:45 m72e systemd[1]: Started Rollback uncommitted netcf network config change transactions. >Jul 05 07:54:45 m72e ModemManager[773]: <info> ModemManager (version 1.6.10-1.el7) starting in system bus... >Jul 05 07:54:45 m72e polkitd[771]: Started polkitd version 0.112 >Jul 05 07:54:45 m72e chronyd[811]: commandkey directive is no longer supported >Jul 05 07:54:45 m72e chronyd[811]: generatecommandkey directive is no longer supported >Jul 05 07:54:45 m72e avahi-daemon[785]: Found user 'avahi' (UID 70) and group 'avahi' (GID 70). >Jul 05 07:54:45 m72e avahi-daemon[785]: Successfully dropped root privileges. >Jul 05 07:54:45 m72e avahi-daemon[785]: avahi-daemon 0.6.31 starting up. >Jul 05 07:54:45 m72e systemd[1]: Started Virtual Machine and Container Registration Service. >Jul 05 07:54:45 m72e systemd[1]: Started Avahi mDNS/DNS-SD Stack. >Jul 05 07:54:45 m72e avahi-daemon[785]: Successfully called chroot(). >Jul 05 07:54:45 m72e avahi-daemon[785]: Successfully dropped remaining capabilities. >Jul 05 07:54:45 m72e avahi-daemon[785]: No service file found in /etc/avahi/services. >Jul 05 07:54:45 m72e systemd[1]: Started Kernel Samepage Merging (KSM) Tuning Daemon. >Jul 05 07:54:45 m72e avahi-daemon[785]: Network interface enumeration completed. >Jul 05 07:54:45 m72e avahi-daemon[785]: Registering HINFO record with values 'X86_64'/'LINUX'. >Jul 05 07:54:45 m72e avahi-daemon[785]: Server startup complete. Host name is m72e.local. Local service cookie is 150810377. >Jul 05 07:54:45 m72e smartd[784]: smartd 6.5 2016-05-07 r4318 [x86_64-linux-3.10.0-915.el7.x86_64] (local build) >Jul 05 07:54:45 m72e smartd[784]: Copyright (C) 2002-16, Bruce Allen, Christian Franke, www.smartmontools.org >Jul 05 07:54:45 m72e smartd[784]: Opened configuration file /etc/smartmontools/smartd.conf >Jul 05 07:54:45 m72e smartd[784]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices >Jul 05 07:54:45 m72e smartd[784]: Device: /dev/sda, type changed from 'scsi' to 'sat' >Jul 05 07:54:45 m72e smartd[784]: Device: /dev/sda [SAT], opened >Jul 05 07:54:45 m72e smartd[784]: Device: /dev/sda [SAT], HITACHI HTS547575A9E384, S/N:J2540059G3703E, WWN:5-000cca-6e0c17767, FW:JE4ZD60D, 750 GB >Jul 05 07:54:45 m72e smartd[784]: Device: /dev/sda [SAT], not found in smartd database. >Jul 05 07:54:46 m72e smartd[784]: Device: /dev/sda [SAT], is SMART capable. Adding to "monitor" list. >Jul 05 07:54:46 m72e smartd[784]: Monitoring 1 ATA/SATA, 0 SCSI/SAS and 0 NVMe devices >Jul 05 07:54:46 m72e chronyd[811]: Frequency -11.277 +/- 0.036 ppm read from /var/lib/chrony/drift >Jul 05 07:54:46 m72e systemd[1]: Started NTP client/server. >Jul 05 07:54:47 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Jul 05 07:54:47 m72e polkitd[771]: Loading rules from directory /etc/polkit-1/rules.d >Jul 05 07:54:47 m72e polkitd[771]: Loading rules from directory /usr/share/polkit-1/rules.d >Jul 05 07:54:47 m72e systemd[1]: Started Install ABRT coredump hook. >Jul 05 07:54:47 m72e systemd[1]: Started Modem Manager. >Jul 05 07:54:48 m72e polkitd[771]: Finished loading, compiling and executing 10 rules >Jul 05 07:54:48 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Jul 05 07:54:48 m72e polkitd[771]: Acquired the name org.freedesktop.PolicyKit1 on the system bus >Jul 05 07:54:48 m72e systemd[1]: Started Authorization Manager. >Jul 05 07:54:48 m72e accounts-daemon[777]: started daemon version 0.6.49 >Jul 05 07:54:48 m72e abrtd[790]: Init complete, entering main loop >Jul 05 07:54:48 m72e systemd[1]: Starting firewalld - dynamic firewall daemon... >Jul 05 07:54:48 m72e systemd[1]: Started Accounts Service. >Jul 05 07:54:50 m72e ModemManager[773]: <info> Couldn't check support for device at '/sys/devices/pci0000:00/0000:00:1c.4/0000:02:00.0': not supported by any plugin >Jul 05 07:54:50 m72e ModemManager[773]: <info> Couldn't check support for device at '/sys/devices/pci0000:00/0000:00:1c.5/0000:03:00.0': not supported by any plugin >Jul 05 07:54:55 m72e systemd[1]: Started firewalld - dynamic firewall daemon. >Jul 05 07:54:55 m72e systemd[1]: Reached target Network (Pre). >Jul 05 07:54:55 m72e systemd[1]: Network Manager is not active. >Jul 05 07:54:55 m72e systemd[1]: Dependency failed for Network Manager Wait Online. >Jul 05 07:54:55 m72e systemd[1]: Job NetworkManager-wait-online.service/start failed with result 'dependency'. >Jul 05 07:54:55 m72e systemd[1]: Starting LSB: Bring up/down networking... >Jul 05 07:54:55 m72e kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team >Jul 05 07:54:56 m72e kernel: Ebtables v2.0 registered >Jul 05 07:54:56 m72e kernel: nf_conntrack version 0.5.0 (65536 buckets, 262144 max) >Jul 05 07:54:56 m72e network[847]: Bringing up loopback interface: [ OK ] >Jul 05 07:54:56 m72e kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. >Jul 05 07:54:56 m72e kernel: Netfilter messages via NETLINK v0.30. >Jul 05 07:54:56 m72e kernel: r8169 0000:03:00.0 enp3s0: link down >Jul 05 07:54:56 m72e kernel: r8169 0000:03:00.0 enp3s0: link down >Jul 05 07:54:56 m72e kernel: IPv6: ADDRCONF(NETDEV_UP): enp3s0: link is not ready >Jul 05 07:54:56 m72e kernel: br0: port 1(enp3s0) entered blocking state >Jul 05 07:54:56 m72e kernel: br0: port 1(enp3s0) entered disabled state >Jul 05 07:54:56 m72e kernel: device enp3s0 entered promiscuous mode >Jul 05 07:54:56 m72e network[847]: Bringing up interface enp3s0: [ OK ] >Jul 05 07:54:56 m72e kernel: ip_set: protocol 6 >Jul 05 07:54:56 m72e kernel: IPv6: ADDRCONF(NETDEV_UP): br0: link is not ready >Jul 05 07:54:58 m72e kernel: r8169 0000:03:00.0 enp3s0: link up >Jul 05 07:54:58 m72e kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp3s0: link becomes ready >Jul 05 07:54:58 m72e kernel: br0: port 1(enp3s0) entered blocking state >Jul 05 07:54:58 m72e kernel: br0: port 1(enp3s0) entered forwarding state >Jul 05 07:54:58 m72e kernel: IPv6: ADDRCONF(NETDEV_CHANGE): br0: link becomes ready >Jul 05 07:54:59 m72e avahi-daemon[785]: Registering new address record for fe80::223:24ff:fe3c:3174 on enp3s0.*. >Jul 05 07:55:00 m72e avahi-daemon[785]: Registering new address record for fe80::223:24ff:fe3c:3174 on br0.*. >Jul 05 07:55:00 m72e avahi-daemon[785]: Joining mDNS multicast group on interface br0.IPv4 with address 192.168.1.200. >Jul 05 07:55:00 m72e avahi-daemon[785]: New relevant interface br0.IPv4 for mDNS. >Jul 05 07:55:00 m72e avahi-daemon[785]: Registering new address record for 192.168.1.200 on br0.IPv4. >Jul 05 07:55:00 m72e NET[1258]: /etc/sysconfig/network-scripts/ifup-post : updated /etc/resolv.conf >Jul 05 07:55:01 m72e network[847]: Bringing up interface br0: [ OK ] >Jul 05 07:55:01 m72e systemd[1]: Started LSB: Bring up/down networking. >Jul 05 07:55:01 m72e systemd[1]: Reached target Network. >Jul 05 07:55:01 m72e systemd[1]: Starting OpenSSH server daemon... >Jul 05 07:55:01 m72e systemd[1]: Starting Dynamic System Tuning Daemon... >Jul 05 07:55:01 m72e systemd[1]: Started CUPS Printing Service. >Jul 05 07:55:01 m72e systemd[1]: Starting Logout off all iSCSI sessions on shutdown... >Jul 05 07:55:01 m72e systemd[1]: Starting Postfix Mail Transport Agent... >Jul 05 07:55:01 m72e systemd[1]: Reached target Network is Online. >Jul 05 07:55:01 m72e systemd[1]: Starting Notify NFS peers of a restart... >Jul 05 07:55:01 m72e sm-notify[1285]: Version 1.3.0 starting >Jul 05 07:55:01 m72e systemd[1]: Starting System Logging Service... >Jul 05 07:55:01 m72e systemd[1]: Starting SYSV: This service starts and stops VMware services... >Jul 05 07:55:01 m72e systemd[1]: Started Logout off all iSCSI sessions on shutdown. >Jul 05 07:55:01 m72e systemd[1]: Started Notify NFS peers of a restart. >Jul 05 07:55:01 m72e systemd[1]: Reached target Remote File Systems (Pre). >Jul 05 07:55:01 m72e systemd[1]: Reached target Remote File Systems. >Jul 05 07:55:01 m72e systemd[1]: Starting Permit User Sessions... >Jul 05 07:55:01 m72e systemd[1]: Starting Virtualization daemon... >Jul 05 07:55:01 m72e systemd[1]: Starting Availability of block devices... >Jul 05 07:55:01 m72e systemd[1]: Started Availability of block devices. >Jul 05 07:55:02 m72e systemd[1]: Started Permit User Sessions. >Jul 05 07:55:02 m72e systemd[1]: Starting Forward Password Requests to Wall... >Jul 05 07:55:02 m72e systemd[1]: Starting GNOME Display Manager... >Jul 05 07:55:02 m72e systemd[1]: Started Job spooling tools. >Jul 05 07:55:02 m72e systemd[1]: Starting Wait for Plymouth Boot Screen to Quit... >Jul 05 07:55:02 m72e systemd[1]: Started Command Scheduler. >Jul 05 07:55:02 m72e systemd[1]: Stopped Forward Password Requests to Plymouth Directory Watch. >Jul 05 07:55:02 m72e systemd[1]: Stopping Forward Password Requests to Plymouth... >Jul 05 07:55:02 m72e systemd[1]: Stopped Forward Password Requests to Plymouth. >Jul 05 07:55:02 m72e systemd[1]: Started Forward Password Requests to Wall. >Jul 05 07:55:02 m72e crond[1300]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 56% if used.) >Jul 05 07:55:02 m72e systemd[1]: Started GNOME Display Manager. >Jul 05 07:55:02 m72e sshd[1280]: Server listening on 0.0.0.0 port 22. >Jul 05 07:55:02 m72e sshd[1280]: Server listening on :: port 22. >Jul 05 07:55:02 m72e systemd[1]: Started OpenSSH server daemon. >Jul 05 07:55:03 m72e rsyslogd[1288]: [origin software="rsyslogd" swVersion="8.24.0" x-pid="1288" x-info="http://www.rsyslog.com"] start >Jul 05 07:55:03 m72e systemd[1]: Started System Logging Service. >Jul 05 07:55:03 m72e vmware[1289]: Starting VMware services: >Jul 05 07:55:03 m72e vmware[1289]: Virtual machine monitor[FAILED] >Jul 05 07:55:03 m72e kernel: Guest personality initialized and is inactive >Jul 05 07:55:03 m72e kernel: VMCI host device registered (name=vmci, major=10, minor=57) >Jul 05 07:55:03 m72e kernel: Initialized host personality >Jul 05 07:55:03 m72e vmware[1289]: Virtual machine communication interface[ OK ] >Jul 05 07:55:04 m72e kernel: NET: Registered protocol family 40 >Jul 05 07:55:04 m72e vmware[1289]: VM communication interface socket family[ OK ] >Jul 05 07:55:04 m72e crond[1300]: (CRON) INFO (running with inotify support) >Jul 05 07:55:04 m72e kernel: fuse init (API version 7.22) >Jul 05 07:55:04 m72e systemd[1]: Mounting FUSE Control File System... >Jul 05 07:55:04 m72e systemd[1]: Mounted FUSE Control File System. >Jul 05 07:55:05 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Jul 05 07:55:05 m72e systemd[1]: Starting Manage, Install and Generate Color Profiles... >Jul 05 07:55:05 m72e systemd[1]: Created slice User Slice of whot. >Jul 05 07:55:05 m72e systemd[1]: Started Session 1 of user whot. >Jul 05 07:55:05 m72e CROND[1459]: (whot) CMD (/home/whot/scripts/tmp-today) >Jul 05 07:55:06 m72e postfix/postfix-script[1511]: starting the Postfix mail system >Jul 05 07:55:06 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Jul 05 07:55:06 m72e systemd[1]: Started Manage, Install and Generate Color Profiles. >Jul 05 07:55:06 m72e postfix/master[1513]: daemon started -- version 2.10.1, configuration /etc/postfix >Jul 05 07:55:06 m72e systemd[1]: Started Postfix Mail Transport Agent. >Jul 05 07:55:07 m72e colord[1456]: failed to get session [pid 1282]: No such file or directory >Jul 05 07:55:07 m72e vmware[1289]: Blocking file system[ OK ] >Jul 05 07:55:07 m72e vmware[1289]: Virtual ethernet[FAILED] >Jul 05 07:55:07 m72e vmware[1289]: VMware Authentication Daemon[ OK ] >Jul 05 07:55:07 m72e systemd[1]: vmware.service: control process exited, code=exited status=1 >Jul 05 07:55:07 m72e systemd[1]: Failed to start SYSV: This service starts and stops VMware services. >Jul 05 07:55:07 m72e systemd[1]: Unit vmware.service entered failed state. >Jul 05 07:55:07 m72e systemd[1]: vmware.service failed. >Jul 05 07:55:07 m72e systemd[1]: Starting SYSV: This services starts and stops the USB Arbitrator.... >Jul 05 07:55:08 m72e kernel: ppdev: user-space parallel port driver >Jul 05 07:55:08 m72e systemd[1]: Removed slice User Slice of whot. >Jul 05 07:55:08 m72e vmware-USBArbitrator[1543]: [ OK ] >Jul 05 07:55:08 m72e systemd[1]: Started SYSV: This services starts and stops the USB Arbitrator.. >Jul 05 07:55:08 m72e systemd[1]: Starting LSB: Starts the Spacewalk Daemon... >Jul 05 07:55:08 m72e rhnsd[1602]: Starting Spacewalk Daemon: [ OK ] >Jul 05 07:55:08 m72e rhnsd[1620]: Spacewalk Services Daemon starting up, check in interval 240 minutes. >Jul 05 07:55:08 m72e systemd[1]: Started LSB: Starts the Spacewalk Daemon. >Jul 05 07:55:08 m72e systemd[1]: Started Dynamic System Tuning Daemon. >Jul 05 07:55:09 m72e systemd[1]: Started Virtualization daemon. >Jul 05 07:55:11 m72e kernel: tun: Universal TUN/TAP device driver, 1.6 >Jul 05 07:55:11 m72e kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com> >Jul 05 07:55:11 m72e kernel: virbr0: port 1(virbr0-nic) entered blocking state >Jul 05 07:55:11 m72e kernel: virbr0: port 1(virbr0-nic) entered disabled state >Jul 05 07:55:11 m72e kernel: device virbr0-nic entered promiscuous mode >Jul 05 07:55:12 m72e avahi-daemon[785]: Joining mDNS multicast group on interface virbr0.IPv4 with address 192.168.122.1. >Jul 05 07:55:12 m72e kernel: virbr0: port 1(virbr0-nic) entered blocking state >Jul 05 07:55:12 m72e kernel: virbr0: port 1(virbr0-nic) entered listening state >Jul 05 07:55:12 m72e kernel: IPv6: ADDRCONF(NETDEV_UP): virbr0: link is not ready >Jul 05 07:55:12 m72e avahi-daemon[785]: New relevant interface virbr0.IPv4 for mDNS. >Jul 05 07:55:12 m72e avahi-daemon[785]: Registering new address record for 192.168.122.1 on virbr0.IPv4. >Jul 05 07:55:12 m72e systemd[1]: Created slice User Slice of gdm. >Jul 05 07:55:12 m72e systemd-logind[774]: New session c1 of user gdm. >Jul 05 07:55:12 m72e systemd[1]: Started Session c1 of user gdm. >Jul 05 07:55:12 m72e gdm-launch-environment][1677]: pam_unix(gdm-launch-environment:session): session opened for user gdm by (uid=0) >Jul 05 07:55:12 m72e dnsmasq[1697]: started, version 2.76 cachesize 150 >Jul 05 07:55:12 m72e dnsmasq[1697]: compile time options: IPv6 GNU-getopt DBus no-i18n IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset auth no-DNSSEC loop-detect inotify >Jul 05 07:55:12 m72e dnsmasq-dhcp[1697]: DHCP, IP range 192.168.122.25 -- 192.168.122.50, lease time 1h >Jul 05 07:55:12 m72e dnsmasq-dhcp[1697]: DHCP, sockets bound exclusively to interface virbr0 >Jul 05 07:55:12 m72e dnsmasq[1697]: reading /etc/resolv.conf >Jul 05 07:55:12 m72e dnsmasq[1697]: using nameserver 192.168.1.1#53 >Jul 05 07:55:12 m72e dnsmasq[1697]: read /etc/hosts - 3 addresses >Jul 05 07:55:12 m72e dnsmasq[1697]: read /var/lib/libvirt/dnsmasq/default.addnhosts - 0 addresses >Jul 05 07:55:12 m72e dnsmasq-dhcp[1697]: read /var/lib/libvirt/dnsmasq/default.hostsfile >Jul 05 07:55:12 m72e kernel: virbr0: port 1(virbr0-nic) entered disabled state >Jul 05 07:55:12 m72e kernel: virbr1: port 1(virbr1-nic) entered blocking state >Jul 05 07:55:12 m72e kernel: virbr1: port 1(virbr1-nic) entered disabled state >Jul 05 07:55:12 m72e kernel: device virbr1-nic entered promiscuous mode >Jul 05 07:55:12 m72e avahi-daemon[785]: Joining mDNS multicast group on interface virbr1.IPv4 with address 192.168.100.1. >Jul 05 07:55:12 m72e avahi-daemon[785]: New relevant interface virbr1.IPv4 for mDNS. >Jul 05 07:55:12 m72e kernel: virbr1: port 1(virbr1-nic) entered blocking state >Jul 05 07:55:12 m72e kernel: virbr1: port 1(virbr1-nic) entered listening state >Jul 05 07:55:12 m72e kernel: IPv6: ADDRCONF(NETDEV_UP): virbr1: link is not ready >Jul 05 07:55:12 m72e avahi-daemon[785]: Registering new address record for 192.168.100.1 on virbr1.IPv4. >Jul 05 07:55:12 m72e dnsmasq[1726]: started, version 2.76 cachesize 150 >Jul 05 07:55:12 m72e dnsmasq[1726]: compile time options: IPv6 GNU-getopt DBus no-i18n IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset auth no-DNSSEC loop-detect inotify >Jul 05 07:55:12 m72e dnsmasq-dhcp[1726]: DHCP, IP range 192.168.100.128 -- 192.168.100.254, lease time 1h >Jul 05 07:55:12 m72e dnsmasq-dhcp[1726]: DHCP, sockets bound exclusively to interface virbr1 >Jul 05 07:55:12 m72e dnsmasq[1726]: reading /etc/resolv.conf >Jul 05 07:55:12 m72e dnsmasq[1726]: using nameserver 192.168.1.1#53 >Jul 05 07:55:12 m72e dnsmasq[1726]: read /etc/hosts - 3 addresses >Jul 05 07:55:12 m72e dnsmasq[1726]: read /var/lib/libvirt/dnsmasq/default-test.addnhosts - 0 addresses >Jul 05 07:55:12 m72e dnsmasq-dhcp[1726]: read /var/lib/libvirt/dnsmasq/default-test.hostsfile >Jul 05 07:55:12 m72e kernel: virbr1: port 1(virbr1-nic) entered disabled state >Jul 05 07:55:12 m72e libvirtd[1291]: 2018-07-04 21:55:12.436+0000: 1627: info : libvirt version: 4.4.0, package: 2.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2018-06-13-08:03:26, x86-034.build.eng.bos.redhat.com) >Jul 05 07:55:12 m72e libvirtd[1291]: 2018-07-04 21:55:12.436+0000: 1627: info : hostname: m72e >Jul 05 07:55:12 m72e libvirtd[1291]: 2018-07-04 21:55:12.436+0000: 1627: error : virDirOpenInternal:2897 : cannot open directory '/mnt/tftp/Boot/images/RHEL7.4/images': No such file or directory >Jul 05 07:55:12 m72e libvirtd[1291]: 2018-07-04 21:55:12.437+0000: 1627: error : storageDriverAutostartCallback:209 : internal error: Failed to autostart storage pool 'images': cannot open directory '/mnt/tftp/Boot/images/RHEL7.4/images': No such file or directory >Jul 05 07:55:14 m72e org.a11y.Bus[1733]: Activating service name='org.a11y.atspi.Registry' >Jul 05 07:55:14 m72e org.a11y.Bus[1733]: Successfully activated service 'org.a11y.atspi.Registry' >Jul 05 07:55:14 m72e org.a11y.atspi.Registry[1742]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry >Jul 05 07:55:14 m72e gnome-session[1699]: generating cookie with syscall >Jul 05 07:55:14 m72e gnome-session[1699]: generating cookie with syscall >Jul 05 07:55:14 m72e gnome-session[1699]: generating cookie with syscall >Jul 05 07:55:14 m72e gnome-session[1699]: generating cookie with syscall >Jul 05 07:55:16 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Jul 05 07:55:16 m72e systemd[1]: Starting Daemon for power management... >Jul 05 07:55:16 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.UPower' >Jul 05 07:55:16 m72e systemd[1]: Started Daemon for power management. >Jul 05 07:55:18 m72e rtkit-daemon[770]: Successfully made thread 1797 of process 1797 (/usr/bin/pulseaudio) owned by '42' high priority at nice level -11. >Jul 05 07:55:18 m72e rtkit-daemon[770]: Supervising 1 threads of 1 processes of 1 users. >Jul 05 07:55:19 m72e rtkit-daemon[770]: Supervising 1 threads of 1 processes of 1 users. >Jul 05 07:55:19 m72e rtkit-daemon[770]: Successfully made thread 1800 of process 1797 (/usr/bin/pulseaudio) owned by '42' RT at priority 5. >Jul 05 07:55:19 m72e rtkit-daemon[770]: Supervising 2 threads of 1 processes of 1 users. >Jul 05 07:55:19 m72e rtkit-daemon[770]: Supervising 2 threads of 1 processes of 1 users. >Jul 05 07:55:19 m72e rtkit-daemon[770]: Successfully made thread 1803 of process 1797 (/usr/bin/pulseaudio) owned by '42' RT at priority 5. >Jul 05 07:55:19 m72e rtkit-daemon[770]: Supervising 3 threads of 1 processes of 1 users. >Jul 05 07:55:20 m72e chronyd[811]: Selected source 45.76.113.31 >Jul 05 07:55:23 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Jul 05 07:55:24 m72e systemd[1]: Starting Locale Service... >Jul 05 07:55:24 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.locale1' >Jul 05 07:55:24 m72e systemd[1]: Started Locale Service. >Jul 05 07:55:28 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' >Jul 05 07:55:28 m72e systemd[1]: Starting Location Lookup Service... >Jul 05 07:55:28 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.bolt' unit='bolt.service' >Jul 05 07:55:28 m72e systemd[1]: [/usr/lib/systemd/system/bolt.service:11] Unknown lvalue 'MemoryDenyWriteExecute' in section 'Service' >Jul 05 07:55:28 m72e systemd[1]: [/usr/lib/systemd/system/bolt.service:13] Unknown lvalue 'ProtectControlGroups' in section 'Service' >Jul 05 07:55:28 m72e systemd[1]: [/usr/lib/systemd/system/bolt.service:15] Unknown lvalue 'ProtectKernelModules' in section 'Service' >Jul 05 07:55:28 m72e systemd[1]: [/usr/lib/systemd/system/bolt.service:18] Unknown lvalue 'RestrictRealtime' in section 'Service' >Jul 05 07:55:28 m72e systemd[1]: [/usr/lib/systemd/system/bolt.service:19] Unknown lvalue 'ReadWritePaths' in section 'Service' >Jul 05 07:55:28 m72e systemd[1]: Starting Thunderbolt system service... >Jul 05 07:55:28 m72e polkitd[771]: Registered Authentication Agent for unix-session:c1 (system bus name :1.32 [/usr/bin/gnome-shell], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) >Jul 05 07:55:28 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service' >Jul 05 07:55:28 m72e systemd[1]: Starting PackageKit Daemon... >Jul 05 07:55:28 m72e boltd[1846]: bolt 0.4 starting up. >Jul 05 07:55:28 m72e boltd[1846]: config: loading user config >Jul 05 07:55:28 m72e boltd[1846]: store: loading devices >Jul 05 07:55:28 m72e boltd[1846]: power: force_power support: no >Jul 05 07:55:28 m72e boltd[1846]: udev: enumerating devices >Jul 05 07:55:28 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.bolt' >Jul 05 07:55:28 m72e systemd[1]: Started Thunderbolt system service. >Jul 05 07:55:28 m72e spice-vdagent[1855]: Cannot access vdagent virtio channel /dev/virtio-ports/com.redhat.spice.0 >Jul 05 07:55:28 m72e PackageKit[1849]: daemon start >Jul 05 07:55:28 m72e dbus[753]: [system] Activating via systemd: service name='fi.w1.wpa_supplicant1' unit='wpa_supplicant.service' >Jul 05 07:55:29 m72e systemd[1]: Starting WPA Supplicant daemon... >Jul 05 07:55:29 m72e gnome-shell[1765]: Failed to load background 'file:///usr/share/backgrounds/gnome/adwaita-lock.jpg': Error opening file /usr/share/backgrounds/gnome/adwaita-lock.jpg: No such file or directory >Jul 05 07:55:29 m72e dbus[753]: [system] Successfully activated service 'fi.w1.wpa_supplicant1' >Jul 05 07:55:29 m72e systemd[1]: Started WPA Supplicant daemon. >Jul 05 07:55:29 m72e gnome-session-binary[1699]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 07:55:29 m72e gnome-session[1699]: gnome-session-binary[1699]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 07:55:29 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' >Jul 05 07:55:29 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.GeoClue2' >Jul 05 07:55:29 m72e gnome-session-binary[1699]: Entering running state >Jul 05 07:55:29 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.PackageKit' >Jul 05 07:55:29 m72e systemd[1]: Started Location Lookup Service. >Jul 05 07:55:29 m72e systemd[1]: Started PackageKit Daemon. >Jul 05 07:55:29 m72e systemd[1]: Starting Hostname Service... >Jul 05 07:55:29 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.hostname1' >Jul 05 07:55:29 m72e systemd[1]: Started Hostname Service. >Jul 05 07:55:30 m72e dbus[753]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Jul 05 07:55:30 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:11] Failed to parse protect system value, ignoring: strict >Jul 05 07:55:30 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:12] Unknown lvalue 'ProtectKernelTunables' in section 'Service' >Jul 05 07:55:30 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:13] Unknown lvalue 'ProtectControlGroups' in section 'Service' >Jul 05 07:55:30 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:14] Unknown lvalue 'ReadWritePaths' in section 'Service' >Jul 05 07:55:30 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:23] Unknown lvalue 'MemoryDenyWriteExecute' in section 'Service' >Jul 05 07:55:30 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:26] Unknown lvalue 'ProtectKernelModules' in section 'Service' >Jul 05 07:55:30 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:29] Unknown lvalue 'RestrictRealtime' in section 'Service' >Jul 05 07:55:30 m72e systemd[1]: Starting Fingerprint Authentication Daemon... >Jul 05 07:55:30 m72e dbus[753]: [system] Successfully activated service 'net.reactivated.Fprint' >Jul 05 07:55:30 m72e systemd[1]: Started Fingerprint Authentication Daemon. >Jul 05 07:55:30 m72e gnome-shell[1765]: Some code accessed the property 'AuthList' on the module 'authList'. That property was defined with 'let' or 'const' inside the module. This was previously supported, but is not correct according to the ES6 standard. Any symbols to be exported from a module must be defined with 'var'. The property access will work as previously for the time being, but please fix your code anyway. >Jul 05 07:55:30 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.realmd' unit='realmd.service' >Jul 05 07:55:30 m72e systemd[1]: Starting Realm and Domain Configuration... >Jul 05 07:55:30 m72e org.gnome.Shell.desktop[1765]: Window manager warning: "XF86RFKill" is not a valid accelerator >Jul 05 07:55:30 m72e gnome-shell[1765]: Error looking up permission: GDBus.Error:org.freedesktop.portal.Error.NotFound: No entry for geolocation >Jul 05 07:55:30 m72e dbus[753]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Jul 05 07:55:30 m72e realmd[1957]: Loaded settings from: /usr/lib64/realmd/realmd-defaults.conf /usr/lib64/realmd/realmd-distro.conf >Jul 05 07:55:30 m72e realmd[1957]: holding daemon: startup >Jul 05 07:55:30 m72e realmd[1957]: starting service >Jul 05 07:55:30 m72e realmd[1957]: connected to bus >Jul 05 07:55:30 m72e realmd[1957]: released daemon: startup >Jul 05 07:55:30 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.realmd' >Jul 05 07:55:30 m72e systemd[1]: Started Realm and Domain Configuration. >Jul 05 07:55:30 m72e realmd[1957]: claimed name on bus: org.freedesktop.realmd >Jul 05 07:55:30 m72e gnome-shell[1765]: JS WARNING: [resource:///org/gnome/shell/ui/layout.js 29]: reference to undefined property "MetaWindowX11" >Jul 05 07:55:31 m72e systemd[1]: Received SIGRTMIN+21 from PID 238 (plymouthd). >Jul 05 07:55:31 m72e systemd[1]: Started Wait for Plymouth Boot Screen to Quit. >Jul 05 07:55:31 m72e systemd[1]: Reached target Multi-User System. >Jul 05 07:55:31 m72e systemd[1]: Reached target Graphical Interface. >Jul 05 07:55:31 m72e systemd[1]: Starting Update UTMP about System Runlevel Changes... >Jul 05 07:55:31 m72e systemd[1]: Started Stop Read-Ahead Data Collection 10s After Completed Startup. >Jul 05 07:55:31 m72e systemd[1]: Started Update UTMP about System Runlevel Changes. >Jul 05 07:55:31 m72e systemd[1]: Startup finished in 1.609s (kernel) + 3.025s (initrd) + 1min 13.007s (userspace) = 1min 17.642s. >Jul 05 07:55:33 m72e dbus[753]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Jul 05 07:55:34 m72e setroubleshoot[1971]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. For complete SELinux messages run: sealert -l 878583e9-e1dd-462e-a486-e30159ea9944 >Jul 05 07:55:34 m72e python[1971]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that gnome-shell should be allowed map access on the hwdb.bin file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell > # semodule -i my-gnomeshell.pp > >Jul 05 07:55:35 m72e setroubleshoot[1971]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. For complete SELinux messages run: sealert -l 878583e9-e1dd-462e-a486-e30159ea9944 >Jul 05 07:55:35 m72e python[1971]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that gnome-shell should be allowed map access on the hwdb.bin file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell > # semodule -i my-gnomeshell.pp > >Jul 05 07:55:35 m72e setroubleshoot[1971]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. For complete SELinux messages run: sealert -l 878583e9-e1dd-462e-a486-e30159ea9944 >Jul 05 07:55:35 m72e python[1971]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that gnome-shell should be allowed map access on the hwdb.bin file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell > # semodule -i my-gnomeshell.pp > >Jul 05 07:56:01 m72e systemd[1]: Starting Stop Read-Ahead Data Collection... >Jul 05 07:56:01 m72e systemd[1]: Started Stop Read-Ahead Data Collection. >Jul 05 07:56:31 m72e realmd[1957]: quitting realmd service after timeout >Jul 05 07:56:31 m72e realmd[1957]: stopping service >Jul 05 08:00:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 08:00:01 m72e systemd[1]: Started Session 2 of user root. >Jul 05 08:00:01 m72e CROND[2066]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 08:00:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 08:00:06 m72e dbus[753]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Jul 05 08:00:06 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:11] Failed to parse protect system value, ignoring: strict >Jul 05 08:00:06 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:12] Unknown lvalue 'ProtectKernelTunables' in section 'Service' >Jul 05 08:00:06 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:13] Unknown lvalue 'ProtectControlGroups' in section 'Service' >Jul 05 08:00:06 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:14] Unknown lvalue 'ReadWritePaths' in section 'Service' >Jul 05 08:00:06 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:23] Unknown lvalue 'MemoryDenyWriteExecute' in section 'Service' >Jul 05 08:00:06 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:26] Unknown lvalue 'ProtectKernelModules' in section 'Service' >Jul 05 08:00:06 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:29] Unknown lvalue 'RestrictRealtime' in section 'Service' >Jul 05 08:00:06 m72e systemd[1]: Starting Fingerprint Authentication Daemon... >Jul 05 08:00:06 m72e dbus[753]: [system] Successfully activated service 'net.reactivated.Fprint' >Jul 05 08:00:06 m72e systemd[1]: Started Fingerprint Authentication Daemon. >Jul 05 08:00:10 m72e systemd[1]: Created slice User Slice of whot. >Jul 05 08:00:10 m72e systemd-logind[774]: New session 3 of user whot. >Jul 05 08:00:10 m72e systemd[1]: Started Session 3 of user whot. >Jul 05 08:00:10 m72e gdm-password][2080]: pam_unix(gdm-password:session): session opened for user whot by (uid=0) >Jul 05 08:00:13 m72e gnome-session[1699]: gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session[1699]: gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.Clipboard.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session[1699]: gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.Housekeeping.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session[1699]: gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.MediaKeys.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session[1699]: gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session[1699]: gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.Power.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session[1699]: gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.PrintNotifications.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session[1699]: gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.Rfkill.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session[1699]: gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.ScreensaverProxy.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session[1699]: gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.Sharing.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session[1699]: gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.Smartcard.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session[1699]: gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.Wacom.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.Clipboard.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session[1699]: gnome-session-binary[1699]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 08:00:13 m72e gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.Housekeeping.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.MediaKeys.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.Power.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.PrintNotifications.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.Rfkill.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.ScreensaverProxy.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.Sharing.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.Smartcard.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session-binary[1699]: WARNING: Application 'org.gnome.SettingsDaemon.Wacom.desktop' killed by signal 15 >Jul 05 08:00:13 m72e gnome-session-binary[1699]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 08:00:13 m72e polkitd[771]: Unregistered Authentication Agent for unix-session:c1 (system bus name :1.32, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) (disconnected from bus) >Jul 05 08:00:13 m72e gdm-password][2100]: unable to log session >Jul 05 08:00:14 m72e com.redhat.imsettings[2110]: [ 1530741614.316074]: IMSettings-Daemon[2179]: INFO: Starting imsettings-daemon... >Jul 05 08:00:14 m72e com.redhat.imsettings[2110]: [ 1530741614.316285]: IMSettings-Daemon[2179]: INFO: [HOME=/home/whot/.config/imsettings] >Jul 05 08:00:14 m72e com.redhat.imsettings[2110]: [ 1530741614.316350]: IMSettings-Daemon[2179]: INFO: [XINPUTRCDIR=/etc/X11/xinit/] >Jul 05 08:00:14 m72e com.redhat.imsettings[2110]: [ 1530741614.316410]: IMSettings-Daemon[2179]: INFO: [XINPUTDIR=/etc/X11/xinit/xinput.d/] >Jul 05 08:00:14 m72e com.redhat.imsettings[2110]: [ 1530741614.316467]: IMSettings-Daemon[2179]: INFO: [MODULEDIR=/usr/lib64/imsettings] >Jul 05 08:00:14 m72e com.redhat.imsettings[2110]: [ 1530741614.316542]: IMSettings-Daemon[2179]: INFO: [MODULES=gsettings, qt] >Jul 05 08:00:15 m72e org.a11y.Bus[2110]: Activating service name='org.a11y.atspi.Registry' >Jul 05 08:00:15 m72e org.a11y.Bus[2110]: Successfully activated service 'org.a11y.atspi.Registry' >Jul 05 08:00:15 m72e org.a11y.atspi.Registry[2295]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry >Jul 05 08:00:15 m72e gnome-session[2100]: generating cookie with syscall >Jul 05 08:00:15 m72e gnome-session[2100]: generating cookie with syscall >Jul 05 08:00:15 m72e gnome-session[2100]: generating cookie with syscall >Jul 05 08:00:15 m72e gnome-session[2100]: generating cookie with syscall >Jul 05 08:00:15 m72e gnome-keyring-daemon[2095]: Gkm: using old keyring directory: /home/whot/.gnome2/keyrings >Jul 05 08:00:15 m72e gnome-keyring-daemon[2095]: Gkm: using old keyring directory: /home/whot/.gnome2/keyrings >Jul 05 08:00:15 m72e gnome-keyring-ssh.desktop[2320]: SSH_AUTH_SOCK=/run/user/13349/keyring/ssh >Jul 05 08:00:16 m72e dbus[753]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Jul 05 08:00:16 m72e rtkit-daemon[770]: Successfully made thread 2339 of process 2339 (/usr/bin/pulseaudio) owned by '13349' high priority at nice level -11. >Jul 05 08:00:16 m72e rtkit-daemon[770]: Supervising 4 threads of 2 processes of 2 users. >Jul 05 08:00:16 m72e rtkit-daemon[770]: Supervising 4 threads of 2 processes of 2 users. >Jul 05 08:00:16 m72e rtkit-daemon[770]: Successfully made thread 2346 of process 2339 (/usr/bin/pulseaudio) owned by '13349' RT at priority 5. >Jul 05 08:00:16 m72e rtkit-daemon[770]: Supervising 5 threads of 2 processes of 2 users. >Jul 05 08:00:16 m72e rtkit-daemon[770]: Supervising 5 threads of 2 processes of 2 users. >Jul 05 08:00:16 m72e rtkit-daemon[770]: Successfully made thread 2349 of process 2339 (/usr/bin/pulseaudio) owned by '13349' RT at priority 5. >Jul 05 08:00:16 m72e rtkit-daemon[770]: Supervising 6 threads of 2 processes of 2 users. >Jul 05 08:00:16 m72e dbus[753]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' >Jul 05 08:00:16 m72e dbus[753]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Jul 05 08:00:19 m72e setroubleshoot[2335]: SELinux is preventing /usr/libexec/gdm-session-worker from 'read, append' accesses on the file session.log. For complete SELinux messages run: sealert -l 508ab26c-ffb6-4759-84e1-90e0199490bb >Jul 05 08:00:19 m72e python[2335]: SELinux is preventing /usr/libexec/gdm-session-worker from 'read, append' accesses on the file session.log. > > ***** Plugin catchall_labels (83.8 confidence) suggests ******************* > > If you want to allow gdm-session-worker to have read append access on the session.log file > Then you need to change the label on session.log > Do > # semanage fcontext -a -t FILE_TYPE 'session.log' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, admin_crontab_tmp_t, alsa_tmp_t, amanda_tmp_t, anon_inodefs_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, auditadm_sudo_tmp_t, auth_cache_t, auth_home_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cgroup_t, chrome_sandbox_tmp_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_tmp_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_tmp_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_runtime_tmp_t, couchdb_tmp_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_lpd_tmp_t, cupsd_tmp_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, etc_runtime_t, exim_tmp_t, fail2ban_tmp_t, faillog_t, fenced_tmp_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, initrc_var_run_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, iscsi_tmp_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, lastlog_t, ldconfig_tmp_t, livecd_tmp_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_tmp_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, netutils_tmp_t, neutron_tmp_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, pam_var_console_t, pam_var_run_t, passenger_tmp_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_tmp_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_tmp_t, prelude_lml_tmp_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rsync_tmp_t, rtas_errd_tmp_t, samba_net_tmp_t, sbd_tmpfs_t, sblim_tmp_t, secadm_sudo_tmp_t, sectool_tmp_t, security_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, ssh_agent_tmp_t, ssh_keygen_tmp_t, ssh_tmpfs_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_cronjob_tmp_t, system_dbusd_tmp_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_passwd_var_run_t, targetd_tmp_t, tcpd_tmp_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_tmp_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, tgtd_tmp_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, user_cron_spool_t, user_fonts_t, user_mail_tmp_t, user_tmp_t, uucpd_tmp_t, var_auth_t, var_spool_t, varnishd_tmp_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmtools_tmp_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wireshark_tmp_t, wireshark_tmpfs_t, wtmp_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_lock_t, xdm_log_t, xdm_rw_etc_t, xdm_spool_t, xdm_tmpfs_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenstored_tmp_t, xkb_var_lib_t, xserver_log_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t. > Then execute: > restorecon -v 'session.log' > > > ***** Plugin catchall (17.1 confidence) suggests ************************** > > If you believe that gdm-session-worker should be allowed read append access on the session.log file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdm-session-wor' --raw | audit2allow -M my-gdmsessionwor > # semodule -i my-gdmsessionwor.pp > >Jul 05 08:00:19 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' >Jul 05 08:00:19 m72e systemd[1]: Starting Location Lookup Service... >Jul 05 08:00:19 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.GeoClue2' >Jul 05 08:00:19 m72e systemd[1]: Started Location Lookup Service. >Jul 05 08:00:19 m72e polkitd[771]: Registered Authentication Agent for unix-session:3 (system bus name :1.69 [/usr/bin/gnome-shell], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) >Jul 05 08:00:20 m72e setroubleshoot[2335]: SELinux is preventing /usr/libexec/gdm-session-worker from write access on the directory gdm. For complete SELinux messages run: sealert -l 62b4a3f6-9761-4f8f-9235-10f811608807 >Jul 05 08:00:20 m72e python[2335]: SELinux is preventing /usr/libexec/gdm-session-worker from write access on the directory gdm. > > ***** Plugin catchall_labels (83.8 confidence) suggests ******************* > > If you want to allow gdm-session-worker to have write access on the gdm directory > Then you need to change the label on gdm > Do > # semanage fcontext -a -t FILE_TYPE 'gdm' > where FILE_TYPE is one of the following: abrt_var_cache_t, admin_home_t, alsa_home_t, antivirus_home_t, audio_home_t, auth_cache_t, auth_home_t, cache_home_t, cgroup_t, chrome_sandbox_home_t, config_home_t, container_home_t, cvs_home_t, data_home_t, dbus_home_t, etc_t, faillog_t, fetchmail_home_t, fonts_cache_t, gconf_home_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, gnome_home_t, gpg_secret_t, gstreamer_home_t, home_bin_t, home_cert_t, httpd_user_content_t, httpd_user_script_exec_t, icc_data_home_t, iceauth_home_t, init_var_run_t, irc_home_t, irc_tmp_t, irssi_home_t, kismet_home_t, krb5_home_t, krb5_host_rcache_t, local_login_home_t, locale_t, mail_home_rw_t, mail_home_t, mandb_home_t, mozilla_home_t, mozilla_plugin_rw_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mpd_home_t, mpd_user_data_t, mplayer_home_t, mysqld_home_t, openshift_var_lib_t, pam_var_console_t, pam_var_run_t, polipo_cache_home_t, polipo_config_home_t, procmail_home_t, pulseaudio_home_t, rlogind_home_t, root_t, rssh_ro_t, rssh_rw_t, sandbox_file_t, screen_home_t, spamc_home_t, speech-dispatcher_home_t, ssh_home_t, svirt_home_t, systemd_home_t, systemd_passwd_var_run_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_sunshine_home_t, texlive_home_t, thumb_home_t, tmp_t, tmpfs_t, tvtime_home_t, uml_ro_t, uml_rw_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_dir_t, user_home_t, user_tmp_t, usr_t, var_auth_t, var_lib_t, var_lock_t, var_log_t, var_run_t, var_spool_t, var_t, virt_content_t, virt_home_t, vmware_conf_t, vmware_file_t, wine_home_t, wireshark_home_t, xauth_home_t, xdm_home_t, xdm_log_t, xdm_rw_etc_t, xdm_spool_t, xdm_tmpfs_t, xdm_var_lib_t, xdm_var_run_t, xkb_var_lib_t, xserver_log_t. > Then execute: > restorecon -v 'gdm' > > > ***** Plugin catchall (17.1 confidence) suggests ************************** > > If you believe that gdm-session-worker should be allowed write access on the gdm directory by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdm-session-wor' --raw | audit2allow -M my-gdmsessionwor > # semodule -i my-gdmsessionwor.pp > >Jul 05 08:00:20 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.UDisks2' unit='udisks2.service' >Jul 05 08:00:20 m72e systemd[1]: Starting Disk Manager... >Jul 05 08:00:20 m72e udisksd[2427]: udisks daemon version 2.7.3 starting >Jul 05 08:00:21 m72e udisksd[2427]: The 'ntfscluster' utility is not available > The 'ntfslabel' utility is not available > The 'ntfsresize' utility is not available > The 'ntfsfix' utility is not available > The 'mkntfs' utility is not available >Jul 05 08:00:21 m72e udisksd[2427]: Failed to load a libblockdev plugin >Jul 05 08:00:22 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.UDisks2' >Jul 05 08:00:22 m72e udisksd[2427]: Acquired the name org.freedesktop.UDisks2 on the system message bus >Jul 05 08:00:22 m72e systemd[1]: Started Disk Manager. >Jul 05 08:00:23 m72e goa-daemon[2426]: goa-daemon version 3.28.0 starting >Jul 05 08:00:25 m72e goa-identity-se[2457]: GoaKerberosIdentityManager: Using polling for change notification for credential cache type 'KEYRING' >Jul 05 08:00:25 m72e org.gtk.vfs.AfcVolumeMonitor[2110]: Volume monitor alive >Jul 05 08:00:25 m72e spice-vdagent[2508]: Cannot access vdagent virtio channel /dev/virtio-ports/com.redhat.spice.0 >Jul 05 08:00:26 m72e gnome-shell[2327]: Some code accessed the property '_modes' on the module 'sessionMode'. That property was defined with 'let' or 'const' inside the module. This was previously supported, but is not correct according to the ES6 standard. Any symbols to be exported from a module must be defined with 'var'. The property access will work as previously for the time being, but please fix your code anyway. >Jul 05 08:00:26 m72e gnome-session-binary[2100]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 08:00:26 m72e gsd-account[2480]: Settings schema 'org.gnome.settings-daemon.plugins.account' is not installed >Jul 05 08:00:26 m72e kernel: traps: gsd-account[2480] trap int3 ip:7f69346afb11 sp:7ffdf5664420 error:0 >Jul 05 08:00:26 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 08:00:26 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' >Jul 05 08:00:26 m72e gsd-housekeepin[2532]: Loading NVML: libnvidia-ml.so: cannot open shared object file: No such file or directory >Jul 05 08:00:26 m72e systemd[1]: Starting Hostname Service... >Jul 05 08:00:26 m72e gsd-xsettings[2496]: Failed to get current display configuration state: GDBus.Error:org.freedesktop.DBus.Error.NameHasNoOwner: Name "org.gnome.Mutter.DisplayConfig" does not exist >Jul 05 08:00:26 m72e abrt-hook-ccpp[2549]: Process 2480 (gsd-account) of user 13349 killed by SIGTRAP - dumping core >Jul 05 08:00:26 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.hostname1' >Jul 05 08:00:26 m72e systemd[1]: Started Hostname Service. >Jul 05 08:00:26 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.NetworkManager' unit='dbus-org.freedesktop.NetworkManager.service' >Jul 05 08:00:26 m72e dbus[753]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.NetworkManager.service': Unit not found. >Jul 05 08:00:26 m72e gsd-rfkill[2486]: Failed to acquire NetworkManager proxy: Error calling StartServiceByName for org.freedesktop.NetworkManager: GDBus.Error:org.freedesktop.systemd1.NoSuchUnit: Unit not found. >Jul 05 08:00:26 m72e kernel: rfkill: input handler disabled >Jul 05 08:00:26 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc: Permission denied >Jul 05 08:00:26 m72e gsd-color[2528]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc: Permission denied >Jul 05 08:00:26 m72e gsd-media-keys[2537]: g_variant_get_va: assertion 'value != NULL' failed >Jul 05 08:00:26 m72e gsd-media-keys[2537]: g_variant_unref: assertion 'value != NULL' failed >Jul 05 08:00:26 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Jul 05 08:00:26 m72e systemd[1]: Starting Locale Service... >Jul 05 08:00:26 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc: Permission denied >Jul 05 08:00:26 m72e gsd-color[2528]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc: Permission denied >Jul 05 08:00:26 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.locale1' >Jul 05 08:00:26 m72e systemd[1]: Started Locale Service. >Jul 05 08:00:26 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc: Permission denied >Jul 05 08:00:26 m72e gsd-color[2528]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc: Permission denied >Jul 05 08:00:26 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc: Permission denied >Jul 05 08:00:26 m72e gsd-color[2528]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc: Permission denied >Jul 05 08:00:26 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc: Permission denied >Jul 05 08:00:26 m72e gsd-color[2528]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc: Permission denied >Jul 05 08:00:26 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 08:00:26 m72e gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 08:00:26 m72e gsd-account[2608]: Settings schema 'org.gnome.settings-daemon.plugins.account' is not installed >Jul 05 08:00:26 m72e kernel: traps: gsd-account[2608] trap int3 ip:7f05ce564b11 sp:7fffa3f1d580 error:0 >Jul 05 08:00:26 m72e abrt-hook-ccpp[2612]: Process 2608 (gsd-account) of user 13349 killed by SIGTRAP - ignoring (repeated crash) >Jul 05 08:00:26 m72e gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 08:00:26 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 08:00:26 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: App 'org.gnome.SettingsDaemon.Account.desktop' respawning too quickly >Jul 05 08:00:26 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: Error on restarting session managed app: Component 'org.gnome.SettingsDaemon.Account.desktop' crashing too quickly >Jul 05 08:00:26 m72e gnome-session-binary[2100]: WARNING: App 'org.gnome.SettingsDaemon.Account.desktop' respawning too quickly >Jul 05 08:00:26 m72e gnome-session-binary[2100]: WARNING: Error on restarting session managed app: Component 'org.gnome.SettingsDaemon.Account.desktop' crashing too quickly >Jul 05 08:00:27 m72e setroubleshoot[2335]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 08:00:27 m72e python[2335]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-0bac1383fb4abc86437df0bfd31023b9.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-0bac1383fb4abc86437df0bfd31023b9.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 08:00:27 m72e setroubleshoot[2335]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 08:00:27 m72e python[2335]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-0c2d933e282feb5e95379b2caa320512.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-0c2d933e282feb5e95379b2caa320512.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 08:00:27 m72e setroubleshoot[2335]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 08:00:27 m72e python[2335]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-425bbe74e56050940c54b0f2931c5aec.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-425bbe74e56050940c54b0f2931c5aec.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 08:00:27 m72e abrt-server[2605]: Duplicate: core backtrace >Jul 05 08:00:27 m72e abrt-server[2605]: DUP_OF_DIR: /var/spool/abrt/ccpp-2018-07-02-09:55:59-10206 >Jul 05 08:00:27 m72e setroubleshoot[2335]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 08:00:27 m72e abrt-server[2605]: Deleting problem directory ccpp-2018-07-05-08:00:26-2480 (dup of ccpp-2018-07-02-09:55:59-10206) >Jul 05 08:00:27 m72e python[2335]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-9d03684165204e087fc5b6a268ff58f2.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-9d03684165204e087fc5b6a268ff58f2.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 08:00:27 m72e gnome-shell[2327]: JS WARNING: [resource:///org/gnome/shell/ui/workspaceThumbnail.js 887]: reference to undefined property "_switchWorkspaceNotifyId" >Jul 05 08:00:27 m72e setroubleshoot[2335]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. For complete SELinux messages run: sealert -l 6669b36f-d550-4692-840a-03526ca0d447 >Jul 05 08:00:27 m72e python[2335]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gsd-account file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 08:00:27 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 08:00:27 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 08:00:27 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 08:00:27 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 08:00:28 m72e setroubleshoot[2335]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 08:00:28 m72e python[2335]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 08:00:28 m72e abrt-server[2605]: Email address of sender was not specified. Would you like to do so now? If not, 'user@localhost' is to be used [y/N] >Jul 05 08:00:28 m72e abrt-server[2605]: Email address of receiver was not specified. Would you like to do so now? If not, 'root@localhost' is to be used [y/N] >Jul 05 08:00:28 m72e abrt-server[2605]: Sending an email... >Jul 05 08:00:28 m72e abrt-server[2605]: Sending a notification email to: root@localhost >Jul 05 08:00:28 m72e setroubleshoot[2335]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. For complete SELinux messages run: sealert -l 6669b36f-d550-4692-840a-03526ca0d447 >Jul 05 08:00:28 m72e gnome-shell[2327]: Failed to load background 'file:///usr/share/backgrounds/gnome/adwaita-lock.jpg': Error opening file /usr/share/backgrounds/gnome/adwaita-lock.jpg: No such file or directory >Jul 05 08:00:28 m72e python[2335]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gsd-account file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 08:00:28 m72e abrt-server[2605]: send-mail: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 08:00:28 m72e postfix/sendmail[2646]: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 08:00:28 m72e abrt-server[2605]: send-mail: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 08:00:28 m72e postfix/sendmail[2646]: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 08:00:28 m72e abrt-server[2605]: Error running '/bin/mailx' >Jul 05 08:00:28 m72e setroubleshoot[2335]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 08:00:28 m72e python[2335]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 08:00:28 m72e org.gnome.Shell.desktop[2327]: Window manager warning: "XF86RFKill" is not a valid accelerator >Jul 05 08:00:28 m72e setroubleshoot[2335]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 08:00:28 m72e python[2335]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 08:00:28 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' >Jul 05 08:00:28 m72e systemd[1]: Starting Location Lookup Service... >Jul 05 08:00:28 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.GeoClue2' >Jul 05 08:00:28 m72e systemd[1]: Started Location Lookup Service. >Jul 05 08:00:28 m72e gnome-shell[2327]: Error looking up permission: GDBus.Error:org.freedesktop.portal.Error.NotFound: No entry for geolocation >Jul 05 08:00:28 m72e setroubleshoot[2335]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. For complete SELinux messages run: sealert -l c2670567-6ce1-42fd-bb01-7cdf552b3c40 >Jul 05 08:00:28 m72e python[2335]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that postdrop should be allowed map access on the postdrop file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'postdrop' --raw | audit2allow -M my-postdrop > # semodule -i my-postdrop.pp > >Jul 05 08:00:29 m72e gnome-shell[2327]: GNOME Shell started at Thu Jul 05 2018 08:00:25 GMT+1000 (AEST) >Jul 05 08:00:30 m72e telepathy-haze[2461]: Exiting >Jul 05 08:00:32 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: Unable to bind hide_window key, another instance/window has it. >Jul 05 08:00:32 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 08:00:32 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:00:32 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:00:33 m72e systemd-logind[774]: Removed session c1. >Jul 05 08:00:33 m72e systemd[1]: Removed slice User Slice of gdm. >Jul 05 08:00:37 m72e dbus[753]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Jul 05 08:00:37 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:11] Failed to parse protect system value, ignoring: strict >Jul 05 08:00:37 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:12] Unknown lvalue 'ProtectKernelTunables' in section 'Service' >Jul 05 08:00:37 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:13] Unknown lvalue 'ProtectControlGroups' in section 'Service' >Jul 05 08:00:37 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:14] Unknown lvalue 'ReadWritePaths' in section 'Service' >Jul 05 08:00:37 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:23] Unknown lvalue 'MemoryDenyWriteExecute' in section 'Service' >Jul 05 08:00:37 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:26] Unknown lvalue 'ProtectKernelModules' in section 'Service' >Jul 05 08:00:37 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:29] Unknown lvalue 'RestrictRealtime' in section 'Service' >Jul 05 08:00:37 m72e systemd[1]: Starting Fingerprint Authentication Daemon... >Jul 05 08:00:37 m72e dbus[753]: [system] Successfully activated service 'net.reactivated.Fprint' >Jul 05 08:00:37 m72e systemd[1]: Started Fingerprint Authentication Daemon. >Jul 05 08:00:39 m72e sudo[2811]: whot : TTY=pts/0 ; PWD=/home/whot ; USER=root ; COMMAND=/bin/systemctl restart openvpn@bne >Jul 05 08:00:39 m72e polkitd[771]: Registered Authentication Agent for unix-process:2817:38522 (system bus name :1.117 [/usr/bin/pkttyagent --notify-fd 5 --fallback], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) >Jul 05 08:00:39 m72e systemd[1]: Created slice system-openvpn.slice. >Jul 05 08:00:39 m72e systemd[1]: Starting Red Hat openvpn service... >Jul 05 08:00:39 m72e dnsmasq[1697]: reading /etc/resolv.conf >Jul 05 08:00:39 m72e dnsmasq[1726]: reading /etc/resolv.conf >Jul 05 08:00:39 m72e dnsmasq[1726]: using nameserver 10.68.5.26#53 >Jul 05 08:00:39 m72e dnsmasq[1697]: using nameserver 10.68.5.26#53 >Jul 05 08:00:39 m72e dnsmasq[1726]: reading /etc/resolv.conf >Jul 05 08:00:39 m72e dnsmasq[1697]: reading /etc/resolv.conf >Jul 05 08:00:39 m72e dnsmasq[1726]: using nameserver 10.68.5.26#53 >Jul 05 08:00:39 m72e dnsmasq[1726]: using nameserver 192.168.1.1#53 >Jul 05 08:00:39 m72e dnsmasq[1697]: using nameserver 10.68.5.26#53 >Jul 05 08:00:39 m72e dnsmasq[1697]: using nameserver 192.168.1.1#53 >Jul 05 08:00:39 m72e systemd[1]: Started Red Hat openvpn service. >Jul 05 08:00:39 m72e polkitd[771]: Unregistered Authentication Agent for unix-process:2817:38522 (system bus name :1.117, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) (disconnected from bus) >Jul 05 08:00:39 m72e openvpn[2825]: Thu Jul 5 08:00:39 2018 OpenVPN 2.4.6 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 26 2018 >Jul 05 08:00:39 m72e openvpn[2825]: Thu Jul 5 08:00:39 2018 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06 >Jul 05 08:00:40 m72e sudo[2856]: whot : TTY=pts/0 ; PWD=/home/whot ; USER=root ; COMMAND=/bin/systemd-tty-ask-password-agent >Jul 05 08:00:41 m72e dbus[753]: [system] Failed to activate service 'org.bluez': timed out >Jul 05 08:00:41 m72e pulseaudio[2339]: [pulseaudio] bluez5-util.c: GetManagedObjects() failed: org.freedesktop.DBus.Error.NoReply: Did not receive a reply. Possible causes include: the remote application did not send a reply, the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken. >Jul 05 08:01:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 08:01:01 m72e systemd[1]: Started Session 4 of user root. >Jul 05 08:01:01 m72e CROND[2881]: (root) CMD (run-parts /etc/cron.hourly) >Jul 05 08:01:01 m72e run-parts(/etc/cron.hourly)[2887]: starting 0anacron >Jul 05 08:01:01 m72e kernel: usb 2-1.3: new low-speed USB device number 8 using ehci-pci >Jul 05 08:01:01 m72e anacron[2894]: Anacron started on 2018-07-05 >Jul 05 08:01:01 m72e run-parts(/etc/cron.hourly)[2896]: finished 0anacron >Jul 05 08:01:01 m72e anacron[2894]: Will run job `cron.daily' in 31 min. >Jul 05 08:01:01 m72e anacron[2894]: Jobs will be executed sequentially >Jul 05 08:01:01 m72e kernel: usb 2-1.3: New USB device found, idVendor=1050, idProduct=0010 >Jul 05 08:01:01 m72e kernel: usb 2-1.3: New USB device strings: Mfr=1, Product=2, SerialNumber=0 >Jul 05 08:01:01 m72e kernel: usb 2-1.3: Product: Yubico Yubikey II >Jul 05 08:01:01 m72e kernel: usb 2-1.3: Manufacturer: Yubico >Jul 05 08:01:01 m72e kernel: input: Yubico Yubico Yubikey II as /devices/pci0000:00/0000:00:1d.0/usb2/2-1/2-1.3/2-1.3:1.0/input/input10 >Jul 05 08:01:01 m72e kernel: hid-generic 0003:1050:0010.0004: input,hidraw3: USB HID v1.11 Keyboard [Yubico Yubico Yubikey II] on usb-0000:00:1d.0-1.3/input0 >Jul 05 08:01:01 m72e mtp-probe[2901]: checking bus 2, device 8: "/sys/devices/pci0000:00/0000:00:1d.0/usb2/2-1/2-1.3" >Jul 05 08:01:01 m72e mtp-probe[2901]: bus: 2, device: 8 was not an MTP device >Jul 05 08:01:08 m72e openvpn[2825]: Thu Jul 5 08:01:08 2018 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1360) >Jul 05 08:01:14 m72e openvpn[2825]: Thu Jul 5 08:01:14 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]66.187.239.220:443 >Jul 05 08:01:14 m72e openvpn[2825]: Thu Jul 5 08:01:14 2018 UDP link local: (not bound) >Jul 05 08:01:14 m72e openvpn[2825]: Thu Jul 5 08:01:14 2018 UDP link remote: [AF_INET]66.187.239.220:443 >Jul 05 08:01:14 m72e openvpn[2825]: Thu Jul 5 08:01:14 2018 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay >Jul 05 08:01:14 m72e openvpn[2825]: Thu Jul 5 08:01:14 2018 [ovpn.redhat.com] Peer Connection Initiated with [AF_INET]66.187.239.220:443 >Jul 05 08:01:15 m72e openvpn[2825]: Thu Jul 5 08:01:15 2018 TUN/TAP device redhat0 opened >Jul 05 08:01:15 m72e openvpn[2825]: Thu Jul 5 08:01:15 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0 >Jul 05 08:01:15 m72e openvpn[2825]: Thu Jul 5 08:01:15 2018 /sbin/ip link set dev redhat0 up mtu 1360 >Jul 05 08:01:16 m72e openvpn[2825]: Thu Jul 5 08:01:16 2018 /sbin/ip addr add dev redhat0 10.64.54.64/23 broadcast 10.64.55.255 >Jul 05 08:01:16 m72e openvpn[2825]: Thu Jul 5 08:01:16 2018 GID set to openvpn >Jul 05 08:01:16 m72e openvpn[2825]: Thu Jul 5 08:01:16 2018 UID set to openvpn >Jul 05 08:01:16 m72e openvpn[2825]: Thu Jul 5 08:01:16 2018 Initialization Sequence Completed >Jul 05 08:01:20 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: Unable to bind hide_window key, another instance/window has it. >Jul 05 08:01:20 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 08:01:20 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:01:20 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:01:22 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: Unable to bind hide_window key, another instance/window has it. >Jul 05 08:01:22 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 08:01:22 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:01:22 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:01:25 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: Unable to bind hide_window key, another instance/window has it. >Jul 05 08:01:25 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 08:01:25 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:01:25 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:01:41 m72e telepathy-haze[3213]: Exiting >Jul 05 08:01:56 m72e gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' failed to register before timeout >Jul 05 08:01:56 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' failed to register before timeout >Jul 05 08:01:56 m72e vmware-user.desktop[3232]: vmware-user: could not open /proc/fs/vmblock/dev >Jul 05 08:01:56 m72e com.redhat.imsettings[2110]: [ 1530741716.577282]: IMSettings-Daemon[2179]: INFO: Attempting to switch IM to none [lang=en_AU.utf8, update=false] >Jul 05 08:01:56 m72e gnome-session-binary[2100]: Entering running state >Jul 05 08:01:56 m72e libcanberra-login-sound.desktop[3240]: Failed to play sound: File or data not found >Jul 05 08:01:56 m72e com.redhat.imsettings[2110]: No such schema âorg.gnome.settings-daemon.plugins.keyboardâ >Jul 05 08:01:56 m72e com.redhat.imsettings[2110]: [ 1530741716.740607]: IMSettings-Daemon[2179]: WARNING **: Current desktop isn't targeted by IMSettings. >Jul 05 08:01:56 m72e imsettings-start.desktop[3231]: GDBus.Error:org.gtk.GDBus.UnmappedGError.Quark._imsettings_2derror_2dquark.Code5: Current desktop isn't targeted by IMSettings. >Jul 05 08:01:56 m72e com.redhat.imsettings[2110]: Exiting... >Jul 05 08:01:56 m72e com.redhat.imsettings[2110]: [ 1530741716.745726]: IMSettings-Daemon[2179]: INFO: Unloading imesttings module: qt >Jul 05 08:01:56 m72e com.redhat.imsettings[2110]: [ 1530741716.745875]: IMSettings-Daemon[2179]: INFO: Unloading imesttings module: gsettings >Jul 05 08:01:56 m72e com.redhat.imsettings[2110]: [ 1530741716.745957]: IMSettings-Daemon[2179]: INFO: imsettings-daemon is shut down. >Jul 05 08:01:56 m72e gnome-shell[2327]: JS WARNING: [/usr/share/gnome-shell/extensions/top-icons@gnome-shell-extensions.gcampax.github.com/extension.js 118]: reference to undefined property "width" >Jul 05 08:01:58 m72e gnome-shell[2327]: STACK_OP_ADD: window 0x2a00001 already in stack >Jul 05 08:01:58 m72e gnome-shell[2327]: STACK_OP_ADD: window 0x2a00001 already in stack >Jul 05 08:01:59 m72e gnome-software[3223]: plugin appstream took 1.4 seconds to do setup >Jul 05 08:01:59 m72e gnome-software[3223]: enabled plugins: desktop-categories, packagekit-local, packagekit-offline, packagekit-proxy, packagekit-refresh, packagekit-upgrade, packagekit, shell-extensions, systemd-updates, packagekit-url-to-app, fwupd, os-release, appstream, steam, desktop-menu-path, flatpak, hardcoded-blacklist, hardcoded-featured, hardcoded-popular, modalias, packagekit-refine, generic-updates, rewrite-resource, icons, odrs, packagekit-history, provenance, repos, key-colors, provenance-license, packagekit-refine-repos, key-colors-metadata >Jul 05 08:01:59 m72e gnome-software[3223]: disabled plugins: dpkg, dummy, fedora-pkgdb-collections, epiphany >Jul 05 08:01:59 m72e gnome-software[3223]: failed to call gs_plugin_add_updates_historical on packagekit-offline: cannot find repo mhlavink-developerdashboard >Jul 05 08:01:59 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.fwupd' unit='fwupd.service' >Jul 05 08:01:59 m72e systemd[1]: [/usr/lib/systemd/system/fwupd.service:11] Unknown lvalue 'MemoryDenyWriteExecute' in section 'Service' >Jul 05 08:01:59 m72e systemd[1]: [/usr/lib/systemd/system/fwupd.service:13] Unknown lvalue 'ProtectControlGroups' in section 'Service' >Jul 05 08:01:59 m72e systemd[1]: [/usr/lib/systemd/system/fwupd.service:15] Unknown lvalue 'ProtectKernelModules' in section 'Service' >Jul 05 08:01:59 m72e systemd[1]: [/usr/lib/systemd/system/fwupd.service:18] Unknown lvalue 'RestrictRealtime' in section 'Service' >Jul 05 08:01:59 m72e systemd[1]: Starting Firmware update daemon... >Jul 05 08:02:00 m72e fwupd[3334]: failed to open plugin /usr/lib64/fwupd-plugins-3/libfu_plugin_uefi.so: failed to open plugin: /usr/lib64/fwupd-plugins-3/libfu_plugin_uefi.so: undefined symbol: fwup_version >Jul 05 08:02:00 m72e fwupd[3334]: disabling plugin because: failed to startup dell: Firmware updating not supported >Jul 05 08:02:00 m72e fwupd[3334]: disabling plugin because: failed to coldplug amt: ME refused connection >Jul 05 08:02:00 m72e fwupd[3334]: disabling plugin because: failed to coldplug synapticsmst: MST firmware updating not supported by OEM >Jul 05 08:02:00 m72e fwupd[3334]: disabling plugin because: failed to coldplug thunderbolt_power: missing kernel support for intel-wmi-thunderbolt >Jul 05 08:02:00 m72e fwupd[3334]: using plugins: altos, colorhug, csr, dfu, ebitdo, nitrokey, steelseries, thunderbolt, udev, unifying, upower, wacomhid >Jul 05 08:02:00 m72e fwupd[3334]: Daemon ready for requests >Jul 05 08:02:01 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.fwupd' >Jul 05 08:02:01 m72e systemd[1]: Started Firmware update daemon. >Jul 05 08:02:03 m72e kernel: TCP: lp registered >Jul 05 08:02:09 m72e PackageKit[1849]: get-updates transaction /2295_abcabcbc from uid 13349 finished with success after 9943ms >Jul 05 08:02:10 m72e gnome-software[3223]: hiding category productivity featured applications: found only 0 to show, need at least 9 >Jul 05 08:02:10 m72e gnome-software[3223]: hiding category games featured applications: found only 0 to show, need at least 9 >Jul 05 08:02:10 m72e gnome-software[3223]: top-icons@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 08:02:10 m72e gnome-software[3223]: apps-menu@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 08:02:10 m72e gnome-software[3223]: window-list@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 08:02:10 m72e gnome-software[3223]: launch-new-instance@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 08:02:10 m72e gnome-software[3223]: places-menu@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 08:02:10 m72e gnome-software[3223]: alternate-tab@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 08:02:11 m72e PackageKit[1849]: resolve transaction /2296_dcbaaede from uid 13349 finished with success after 824ms >Jul 05 08:02:11 m72e PackageKit[1849]: resolve transaction /2297_deaadcec from uid 13349 finished with success after 235ms >Jul 05 08:02:11 m72e gnome-software[3223]: Only 5 apps for popular list, hiding >Jul 05 08:02:11 m72e PackageKit[1849]: resolve transaction /2298_cbccdedb from uid 13349 finished with success after 281ms >Jul 05 08:02:12 m72e PackageKit[1849]: resolve transaction /2299_acddcbba from uid 13349 finished with success after 535ms >Jul 05 08:02:13 m72e PackageKit[1849]: resolve transaction /2300_beecbbda from uid 13349 finished with success after 1538ms >Jul 05 08:02:15 m72e PackageKit[1849]: get-update-detail transaction /2301_dcaaabdd from uid 13349 finished with success after 2119ms >Jul 05 08:02:15 m72e PackageKit[1849]: search-file transaction /2302_dddecedc from uid 13349 finished with success after 64ms >Jul 05 08:02:15 m72e gnome-software[3223]: Failed to find one package for vmware-player.desktop, /usr/share/applications/vmware-player.desktop, [0] >Jul 05 08:02:16 m72e PackageKit[1849]: search-file transaction /2303_edcebdaa from uid 13349 finished with success after 97ms >Jul 05 08:02:16 m72e PackageKit[1849]: search-file transaction /2304_edcbdcdc from uid 13349 finished with success after 47ms >Jul 05 08:02:16 m72e PackageKit[1849]: search-file transaction /2305_ececacdb from uid 13349 finished with success after 47ms >Jul 05 08:02:16 m72e PackageKit[1849]: search-file transaction /2306_eabcbeea from uid 13349 finished with success after 47ms >Jul 05 08:02:16 m72e PackageKit[1849]: search-file transaction /2307_cdabedbb from uid 13349 finished with success after 97ms >Jul 05 08:02:16 m72e PackageKit[1849]: search-file transaction /2308_beabcaab from uid 13349 finished with success after 47ms >Jul 05 08:02:16 m72e PackageKit[1849]: search-file transaction /2309_dadccbac from uid 13349 finished with success after 98ms >Jul 05 08:02:17 m72e PackageKit[1849]: search-file transaction /2310_beebbcba from uid 13349 finished with success after 47ms >Jul 05 08:02:17 m72e PackageKit[1849]: search-file transaction /2311_dbdcaacd from uid 13349 finished with success after 96ms >Jul 05 08:02:17 m72e PackageKit[1849]: search-file transaction /2312_edbadcba from uid 13349 finished with success after 47ms >Jul 05 08:02:17 m72e PackageKit[1849]: search-file transaction /2313_bebdbeac from uid 13349 finished with success after 97ms >Jul 05 08:02:17 m72e PackageKit[1849]: search-file transaction /2314_cecdabbd from uid 13349 finished with success after 47ms >Jul 05 08:02:17 m72e PackageKit[1849]: search-file transaction /2315_bcbdeaae from uid 13349 finished with success after 97ms >Jul 05 08:02:17 m72e PackageKit[1849]: search-file transaction /2316_dbdacedd from uid 13349 finished with success after 46ms >Jul 05 08:02:18 m72e PackageKit[1849]: search-file transaction /2317_bbeaddcd from uid 13349 finished with success after 97ms >Jul 05 08:02:18 m72e PackageKit[1849]: search-file transaction /2318_aabacbea from uid 13349 finished with success after 97ms >Jul 05 08:02:18 m72e PackageKit[1849]: search-file transaction /2319_dbeadaaa from uid 13349 finished with success after 97ms >Jul 05 08:02:18 m72e PackageKit[1849]: search-file transaction /2320_caeccccc from uid 13349 finished with success after 47ms >Jul 05 08:02:18 m72e PackageKit[1849]: search-file transaction /2321_addadbba from uid 13349 finished with success after 97ms >Jul 05 08:02:18 m72e PackageKit[1849]: search-file transaction /2322_adeaeaca from uid 13349 finished with success after 97ms >Jul 05 08:02:19 m72e PackageKit[1849]: get-details transaction /2323_cecaecbc from uid 13349 finished with success after 103ms >Jul 05 08:03:33 m72e PackageKit[1849]: get-updates transaction /2324_decdcacd from uid 13349 finished with success after 32765ms >Jul 05 08:03:33 m72e PackageKit[1849]: new update-packages transaction /2325_ddeaacad scheduled from uid 13349 >Jul 05 08:04:13 m72e PackageKit[1849]: update-packages transaction /2325_ddeaacad from uid 13349 finished with success after 40468ms >Jul 05 08:04:20 m72e PackageKit[1849]: get-updates transaction /2326_bcdbbcde from uid 13349 finished with success after 2873ms >Jul 05 08:04:20 m72e PackageKit[1849]: get-updates transaction /2327_acbcaaeb from uid 13349 finished with success after 716ms >Jul 05 08:04:46 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: Unable to bind hide_window key, another instance/window has it. >Jul 05 08:04:46 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 08:04:46 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:04:46 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:05:48 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: /usr/bin/terminator:140: GtkWarning: IA__gdk_window_get_events: assertion 'GDK_IS_WINDOW (window)' failed >Jul 05 08:05:48 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: gtk.main() >Jul 05 08:05:48 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: /usr/bin/terminator:140: Warning: g_object_ref: assertion 'G_IS_OBJECT (object)' failed >Jul 05 08:05:48 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: gtk.main() >Jul 05 08:05:48 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: /usr/bin/terminator:140: Warning: g_object_unref: assertion 'G_IS_OBJECT (object)' failed >Jul 05 08:05:48 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: gtk.main() >Jul 05 08:05:48 m72e gnome-shell[2327]: pushModal: invocation of begin_modal failed >Jul 05 08:05:49 m72e gnome-shell[2327]: pushModal: invocation of begin_modal failed >Jul 05 08:05:49 m72e org.a11y.atspi.Registry[2295]: XIO: fatal IO error 11 (Resource temporarily unavailable) on X server ":0" >Jul 05 08:05:49 m72e org.a11y.atspi.Registry[2295]: after 263 requests (263 known processed) with 0 events remaining. >Jul 05 08:05:49 m72e org.gtk.vfs.Daemon[2110]: A connection to the bus can't be made >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 08:05:49 m72e kernel: rfkill: input handler enabled >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 08:05:49 m72e gnome-shell[2327]: gnome-shell: Fatal IO error 0 (Success) on X server :0. >Jul 05 08:05:49 m72e ibus-portal[2379]: Error releasing name org.freedesktop.portal.IBus: The connection is closed >Jul 05 08:05:49 m72e org.gnome.Shell.CalendarServer[2110]: gnome-shell-calendar-server[2395]: Lost (or failed to acquire) the name org.gnome.Shell.CalendarServer - exiting >Jul 05 08:05:49 m72e gsd-power[2481]: gsd-power: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: App 'org.gnome.SettingsDaemon.Power.desktop' exited with code 1 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: App 'org.gnome.SettingsDaemon.Power.desktop' exited with code 1 >Jul 05 08:05:49 m72e gsd-xsettings[2496]: gsd-xsettings: Fatal IO error 104 (Connection reset by peer) on X server :0. >Jul 05 08:05:49 m72e polkitd[771]: Unregistered Authentication Agent for unix-session:3 (system bus name :1.69, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) (disconnected from bus) >Jul 05 08:05:49 m72e unknown[2505]: gsd-wacom: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: App 'org.gnome.SettingsDaemon.XSettings.desktop' exited with code 1 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: App 'org.gnome.SettingsDaemon.XSettings.desktop' exited with code 1 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: App 'org.gnome.SettingsDaemon.Wacom.desktop' exited with code 1 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: App 'org.gnome.SettingsDaemon.Clipboard.desktop' exited with code 1 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: App 'org.gnome.SettingsDaemon.Color.desktop' exited with code 1 >Jul 05 08:05:49 m72e unknown[2527]: gsd-clipboard: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: App 'org.gnome.SettingsDaemon.Wacom.desktop' exited with code 1 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.PrintNotifications.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.ScreensaverProxy.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: App 'org.gnome.SettingsDaemon.Keyboard.desktop' exited with code 1 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: App 'org.gnome.SettingsDaemon.MediaKeys.desktop' exited with code 1 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Rfkill.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Sharing.desktop' killed by signal 15 >Jul 05 08:05:49 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: terminator: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 08:05:49 m72e unknown[2528]: gsd-color: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: App 'org.gnome.SettingsDaemon.Clipboard.desktop' exited with code 1 >Jul 05 08:05:49 m72e sealertauto.desktop[3226]: seapplet: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 08:05:49 m72e unknown[2537]: gsd-media-keys: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: App 'org.gnome.SettingsDaemon.Color.desktop' exited with code 1 >Jul 05 08:05:49 m72e unknown[2533]: gsd-keyboard: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.PrintNotifications.desktop' killed by signal 15 >Jul 05 08:05:49 m72e evolution-alarm[3228]: evolution-alarm-notify: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.ScreensaverProxy.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: App 'org.gnome.SettingsDaemon.Keyboard.desktop' exited with code 1 >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: App 'org.gnome.SettingsDaemon.MediaKeys.desktop' exited with code 1 >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Rfkill.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Sharing.desktop' killed by signal 15 >Jul 05 08:05:49 m72e abrt-applet[3229]: abrt: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 08:05:49 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[2537]: terminator: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: App 'org.gnome.Shell.desktop' exited with code 1 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: App 'org.gnome.Shell.desktop' exited with code 1 >Jul 05 08:05:49 m72e firefox[3489]: firefox: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 08:05:49 m72e rhsm-icon[3254]: rhsm-icon: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Smartcard.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Smartcard.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Sound.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Sound.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' killed by signal 15 >Jul 05 08:05:49 m72e org.gtk.vfs.Daemon[2110]: A connection to the bus can't be made >Jul 05 08:05:49 m72e evolution-calen[2706]: Error releasing name org.gnome.evolution.dataserver.Subprocess.Backend.Calendarx2666x2: The connection is closed >Jul 05 08:05:49 m72e gnome-session-f[3954]: Cannot open display: >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Housekeeping.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Datetime.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session[2100]: gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Housekeeping.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Datetime.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gnome-session-binary[2100]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 08:05:49 m72e gdm-password][2080]: pam_unix(gdm-password:session): session closed for user whot >Jul 05 08:05:49 m72e gdm[1297]: *** Error in `/usr/sbin/gdm': double free or corruption (fasttop): 0x0000558817359840 *** >Jul 05 08:05:49 m72e gdm[1297]: ======= Backtrace: ========= >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libc.so.6(+0x81489)[0x7f77cadd5489] >Jul 05 08:05:49 m72e gdm[1297]: /usr/sbin/gdm(+0x1a552)[0x5588154dd552] >Jul 05 08:05:49 m72e gdm[1297]: /usr/sbin/gdm(+0x1bec2)[0x5588154deec2] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(g_closure_invoke+0x138)[0x7f77cbf0a988] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(+0x2205d)[0x7f77cbf1d05d] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(g_signal_emit_valist+0xe11)[0x7f77cbf24ff1] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(g_signal_emit+0x8f)[0x7f77cbf252df] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(+0x14254)[0x7f77cbf0f254] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(g_object_notify+0x169)[0x7f77cbf11669] >Jul 05 08:05:49 m72e gdm[1297]: /usr/sbin/gdm(+0x15ca0)[0x5588154d8ca0] >Jul 05 08:05:49 m72e gdm[1297]: /usr/sbin/gdm(+0x19e8a)[0x5588154dce8a] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(g_closure_invoke+0x138)[0x7f77cbf0a988] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(+0x2205d)[0x7f77cbf1d05d] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(g_signal_emit_valist+0xe11)[0x7f77cbf24ff1] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(g_signal_emit+0x8f)[0x7f77cbf252df] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libffi.so.6(ffi_call_unix64+0x4c)[0x7f77cab51dcc] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libffi.so.6(ffi_call+0x1f5)[0x7f77cab516f5] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(g_cclosure_marshal_generic+0x1f8)[0x7f77cbf0b1c8] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(g_closure_invoke+0x138)[0x7f77cbf0a988] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(+0x2205d)[0x7f77cbf1d05d] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(g_signal_emitv+0x231)[0x7f77cbf24171] >Jul 05 08:05:49 m72e gdm[1297]: /usr/sbin/gdm(+0x3e803)[0x558815501803] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libffi.so.6(ffi_call_unix64+0x4c)[0x7f77cab51dcc] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libffi.so.6(ffi_call+0x1f5)[0x7f77cab516f5] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(g_cclosure_marshal_generic+0x1f8)[0x7f77cbf0b1c8] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(g_closure_invoke+0x138)[0x7f77cbf0a988] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(+0x21e1b)[0x7f77cbf1ce1b] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(g_signal_emit_valist+0xe11)[0x7f77cbf24ff1] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgobject-2.0.so.0(g_signal_emit+0x8f)[0x7f77cbf252df] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgio-2.0.so.0(+0xcbcec)[0x7f77cc216cec] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libgio-2.0.so.0(+0xbb2a5)[0x7f77cc2062a5] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libglib-2.0.so.0(+0x48c77)[0x7f77cbc2dc77] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libglib-2.0.so.0(g_main_context_dispatch+0x159)[0x7f77cbc31049] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libglib-2.0.so.0(+0x4c3a8)[0x7f77cbc313a8] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libglib-2.0.so.0(g_main_loop_run+0x6a)[0x7f77cbc3167a] >Jul 05 08:05:49 m72e gdm[1297]: /usr/sbin/gdm(+0xfcd1)[0x5588154d2cd1] >Jul 05 08:05:49 m72e gdm[1297]: /lib64/libc.so.6(__libc_start_main+0xf5)[0x7f77cad763d5] >Jul 05 08:05:49 m72e gdm[1297]: /usr/sbin/gdm(+0xff59)[0x5588154d2f59] >Jul 05 08:05:49 m72e gdm[1297]: ======= Memory map: ======== >Jul 05 08:05:49 m72e gdm[1297]: 5588154c3000-558815524000 r-xp 00000000 08:02 404246096 /usr/sbin/gdm >Jul 05 08:05:49 m72e gdm[1297]: 558815724000-55881572a000 r--p 00061000 08:02 404246096 /usr/sbin/gdm >Jul 05 08:05:49 m72e gdm[1297]: 55881572a000-55881572b000 rw-p 00067000 08:02 404246096 /usr/sbin/gdm >Jul 05 08:05:49 m72e gdm[1297]: 558817320000-55881739e000 rw-p 00000000 00:00 0 [heap] >Jul 05 08:05:49 m72e gdm[1297]: 7f77a8000000-7f77a8022000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77a8022000-7f77ac000000 ---p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77b0000000-7f77b0021000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77b0021000-7f77b4000000 ---p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77b4000000-7f77b4022000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77b4022000-7f77b8000000 ---p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77baffe000-7f77bafff000 ---p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77bafff000-7f77bb7ff000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77bb7ff000-7f77bb800000 ---p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77bb800000-7f77bc000000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77bc000000-7f77bc021000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77bc021000-7f77c0000000 ---p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c0229000-7f77c022a000 ---p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c022a000-7f77c0a2a000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c0a2a000-7f77c0a2b000 ---p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c0a2b000-7f77c122b000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c122b000-7f77c1237000 r-xp 00000000 08:02 404810219 /usr/lib64/libnss_files-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c1237000-7f77c1436000 ---p 0000c000 08:02 404810219 /usr/lib64/libnss_files-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c1436000-7f77c1437000 r--p 0000b000 08:02 404810219 /usr/lib64/libnss_files-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c1437000-7f77c1438000 rw-p 0000c000 08:02 404810219 /usr/lib64/libnss_files-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c1438000-7f77c143e000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c143e000-7f77c7968000 r--p 00000000 08:02 134232878 /usr/lib/locale/locale-archive >Jul 05 08:05:49 m72e gdm[1297]: 7f77c7968000-7f77c7977000 r-xp 00000000 08:02 402759191 /usr/lib64/libbz2.so.1.0.6 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c7977000-7f77c7b76000 ---p 0000f000 08:02 402759191 /usr/lib64/libbz2.so.1.0.6 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c7b76000-7f77c7b77000 r--p 0000e000 08:02 402759191 /usr/lib64/libbz2.so.1.0.6 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c7b77000-7f77c7b78000 rw-p 0000f000 08:02 402759191 /usr/lib64/libbz2.so.1.0.6 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c7b78000-7f77c7b8f000 r-xp 00000000 08:02 402759180 /usr/lib64/libelf-0.172.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c7b8f000-7f77c7d8e000 ---p 00017000 08:02 402759180 /usr/lib64/libelf-0.172.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c7d8e000-7f77c7d8f000 r--p 00016000 08:02 402759180 /usr/lib64/libelf-0.172.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c7d8f000-7f77c7d90000 rw-p 00017000 08:02 402759180 /usr/lib64/libelf-0.172.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c7d90000-7f77c7d94000 r-xp 00000000 08:02 402687657 /usr/lib64/libattr.so.1.1.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c7d94000-7f77c7f93000 ---p 00004000 08:02 402687657 /usr/lib64/libattr.so.1.1.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c7f93000-7f77c7f94000 r--p 00003000 08:02 402687657 /usr/lib64/libattr.so.1.1.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c7f94000-7f77c7f95000 rw-p 00004000 08:02 402687657 /usr/lib64/libattr.so.1.1.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c7f95000-7f77c7f97000 r-xp 00000000 08:02 402660474 /usr/lib64/libfreebl3.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c7f97000-7f77c8196000 ---p 00002000 08:02 402660474 /usr/lib64/libfreebl3.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8196000-7f77c8197000 r--p 00001000 08:02 402660474 /usr/lib64/libfreebl3.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8197000-7f77c8198000 rw-p 00002000 08:02 402660474 /usr/lib64/libfreebl3.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8198000-7f77c819c000 r-xp 00000000 08:02 404318661 /usr/lib64/libuuid.so.1.3.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c819c000-7f77c839b000 ---p 00004000 08:02 404318661 /usr/lib64/libuuid.so.1.3.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c839b000-7f77c839c000 r--p 00003000 08:02 404318661 /usr/lib64/libuuid.so.1.3.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c839c000-7f77c839d000 rw-p 00004000 08:02 404318661 /usr/lib64/libuuid.so.1.3.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c839d000-7f77c83d9000 r-xp 00000000 08:02 404363268 /usr/lib64/libblkid.so.1.1.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c83d9000-7f77c85d8000 ---p 0003c000 08:02 404363268 /usr/lib64/libblkid.so.1.1.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c85d8000-7f77c85db000 r--p 0003b000 08:02 404363268 /usr/lib64/libblkid.so.1.1.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c85db000-7f77c85dc000 rw-p 0003e000 08:02 404363268 /usr/lib64/libblkid.so.1.1.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c85dc000-7f77c85dd000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c85dd000-7f77c8629000 r-xp 00000000 08:02 402654656 /usr/lib64/libdw-0.172.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8629000-7f77c8829000 ---p 0004c000 08:02 402654656 /usr/lib64/libdw-0.172.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8829000-7f77c882b000 r--p 0004c000 08:02 402654656 /usr/lib64/libdw-0.172.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c882b000-7f77c882c000 rw-p 0004e000 08:02 402654656 /usr/lib64/libdw-0.172.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c882c000-7f77c8830000 r-xp 00000000 08:02 402825383 /usr/lib64/libgpg-error.so.0.10.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8830000-7f77c8a2f000 ---p 00004000 08:02 402825383 /usr/lib64/libgpg-error.so.0.10.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8a2f000-7f77c8a30000 r--p 00003000 08:02 402825383 /usr/lib64/libgpg-error.so.0.10.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8a30000-7f77c8a31000 rw-p 00004000 08:02 402825383 /usr/lib64/libgpg-error.so.0.10.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8a31000-7f77c8aae000 r-xp 00000000 08:02 402758938 /usr/lib64/libgcrypt.so.11.8.2 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8aae000-7f77c8cad000 ---p 0007d000 08:02 402758938 /usr/lib64/libgcrypt.so.11.8.2 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8cad000-7f77c8cae000 r--p 0007c000 08:02 402758938 /usr/lib64/libgcrypt.so.11.8.2 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8cae000-7f77c8cb1000 rw-p 0007d000 08:02 402758938 /usr/lib64/libgcrypt.so.11.8.2 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8cb1000-7f77c8cb2000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8cb2000-7f77c8cc6000 r-xp 00000000 08:02 402659900 /usr/lib64/liblz4.so.1.7.5 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8cc6000-7f77c8ec5000 ---p 00014000 08:02 402659900 /usr/lib64/liblz4.so.1.7.5 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8ec5000-7f77c8ec6000 r--p 00013000 08:02 402659900 /usr/lib64/liblz4.so.1.7.5 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8ec6000-7f77c8ec7000 rw-p 00014000 08:02 402659900 /usr/lib64/liblz4.so.1.7.5 >Jul 05 08:05:49 m72e abrt-hook-ccpp[3965]: Process 1297 (gdm) of user 0 killed by SIGABRT - dumping core >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8ec7000-7f77c8eec000 r-xp 00000000 08:02 404286709 /usr/lib64/liblzma.so.5.2.2 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c8eec000-7f77c90eb000 ---p 00025000 08:02 404286709 /usr/lib64/liblzma.so.5.2.2 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c90eb000-7f77c90ec000 r--p 00024000 08:02 404286709 /usr/lib64/liblzma.so.5.2.2 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c90ec000-7f77c90ed000 rw-p 00025000 08:02 404286709 /usr/lib64/liblzma.so.5.2.2 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c90ed000-7f77c90f4000 r-xp 00000000 08:02 404810226 /usr/lib64/librt-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c90f4000-7f77c92f3000 ---p 00007000 08:02 404810226 /usr/lib64/librt-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c92f3000-7f77c92f4000 r--p 00006000 08:02 404810226 /usr/lib64/librt-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c92f4000-7f77c92f5000 rw-p 00007000 08:02 404810226 /usr/lib64/librt-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c92f5000-7f77c93f6000 r-xp 00000000 08:02 404810209 /usr/lib64/libm-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c93f6000-7f77c95f5000 ---p 00101000 08:02 404810209 /usr/lib64/libm-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c95f5000-7f77c95f6000 r--p 00100000 08:02 404810209 /usr/lib64/libm-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c95f6000-7f77c95f7000 rw-p 00101000 08:02 404810209 /usr/lib64/libm-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c95f7000-7f77c95fb000 r-xp 00000000 08:02 402713865 /usr/lib64/libcap.so.2.22 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c95fb000-7f77c97fa000 ---p 00004000 08:02 402713865 /usr/lib64/libcap.so.2.22 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c97fa000-7f77c97fb000 r--p 00003000 08:02 402713865 /usr/lib64/libcap.so.2.22 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c97fb000-7f77c97fc000 rw-p 00004000 08:02 402713865 /usr/lib64/libcap.so.2.22 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c97fc000-7f77c9804000 r-xp 00000000 08:02 404230255 /usr/lib64/libcrypt-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c9804000-7f77c9a03000 ---p 00008000 08:02 404230255 /usr/lib64/libcrypt-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c9a03000-7f77c9a04000 r--p 00007000 08:02 404230255 /usr/lib64/libcrypt-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c9a04000-7f77c9a05000 rw-p 00008000 08:02 404230255 /usr/lib64/libcrypt-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c9a05000-7f77c9a33000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c9a33000-7f77c9a48000 r-xp 00000000 08:02 404614628 /usr/lib64/libgcc_s-4.8.5-20150702.so.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c9a48000-7f77c9c47000 ---p 00015000 08:02 404614628 /usr/lib64/libgcc_s-4.8.5-20150702.so.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c9c47000-7f77c9c48000 r--p 00014000 08:02 404614628 /usr/lib64/libgcc_s-4.8.5-20150702.so.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c9c48000-7f77c9c49000 rw-p 00015000 08:02 404614628 /usr/lib64/libgcc_s-4.8.5-20150702.so.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c9c49000-7f77c9c89000 r-xp 00000000 08:02 404934324 /usr/lib64/libmount.so.1.1.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c9c89000-7f77c9e89000 ---p 00040000 08:02 404934324 /usr/lib64/libmount.so.1.1.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c9e89000-7f77c9e8a000 r--p 00040000 08:02 404934324 /usr/lib64/libmount.so.1.1.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c9e8a000-7f77c9e8b000 rw-p 00041000 08:02 404934324 /usr/lib64/libmount.so.1.1.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c9e8b000-7f77c9e8c000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77c9e8c000-7f77c9ea2000 r-xp 00000000 08:02 404810224 /usr/lib64/libresolv-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77c9ea2000-7f77ca0a1000 ---p 00016000 08:02 404810224 /usr/lib64/libresolv-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca0a1000-7f77ca0a2000 r--p 00015000 08:02 404810224 /usr/lib64/libresolv-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca0a2000-7f77ca0a3000 rw-p 00016000 08:02 404810224 /usr/lib64/libresolv-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca0a3000-7f77ca0a5000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca0a5000-7f77ca0c9000 r-xp 00000000 08:02 404810237 /usr/lib64/libselinux.so.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca0c9000-7f77ca2c8000 ---p 00024000 08:02 404810237 /usr/lib64/libselinux.so.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca2c8000-7f77ca2c9000 r--p 00023000 08:02 404810237 /usr/lib64/libselinux.so.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca2c9000-7f77ca2ca000 rw-p 00024000 08:02 404810237 /usr/lib64/libselinux.so.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca2ca000-7f77ca2cc000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca2cc000-7f77ca2e1000 r-xp 00000000 08:02 402666844 /usr/lib64/libz.so.1.2.7 >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca2e1000-7f77ca4e0000 ---p 00015000 08:02 402666844 /usr/lib64/libz.so.1.2.7 >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca4e0000-7f77ca4e1000 r--p 00014000 08:02 402666844 /usr/lib64/libz.so.1.2.7 >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca4e1000-7f77ca4e2000 rw-p 00015000 08:02 402666844 /usr/lib64/libz.so.1.2.7 >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca4e2000-7f77ca542000 r-xp 00000000 08:02 402659796 /usr/lib64/libpcre.so.1.2.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca542000-7f77ca742000 ---p 00060000 08:02 402659796 /usr/lib64/libpcre.so.1.2.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca742000-7f77ca743000 r--p 00060000 08:02 402659796 /usr/lib64/libpcre.so.1.2.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca743000-7f77ca744000 rw-p 00061000 08:02 402659796 /usr/lib64/libpcre.so.1.2.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca744000-7f77ca746000 r-xp 00000000 08:02 404320734 /usr/lib64/libdl-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca746000-7f77ca946000 ---p 00002000 08:02 404320734 /usr/lib64/libdl-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca946000-7f77ca947000 r--p 00002000 08:02 404320734 /usr/lib64/libdl-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca947000-7f77ca948000 rw-p 00003000 08:02 404320734 /usr/lib64/libdl-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca948000-7f77ca94b000 r-xp 00000000 08:02 404999367 /usr/lib64/libgmodule-2.0.so.0.5600.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77ca94b000-7f77cab4a000 ---p 00003000 08:02 404999367 /usr/lib64/libgmodule-2.0.so.0.5600.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cab4a000-7f77cab4b000 r--p 00002000 08:02 404999367 /usr/lib64/libgmodule-2.0.so.0.5600.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cab4b000-7f77cab4c000 rw-p 00003000 08:02 404999367 /usr/lib64/libgmodule-2.0.so.0.5600.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cab4c000-7f77cab53000 r-xp 00000000 08:02 403056696 /usr/lib64/libffi.so.6.0.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cab53000-7f77cad52000 ---p 00007000 08:02 403056696 /usr/lib64/libffi.so.6.0.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cad52000-7f77cad53000 r--p 00006000 08:02 403056696 /usr/lib64/libffi.so.6.0.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cad53000-7f77cad54000 rw-p 00007000 08:02 403056696 /usr/lib64/libffi.so.6.0.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cad54000-7f77caf16000 r-xp 00000000 08:02 402655539 /usr/lib64/libc-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77caf16000-7f77cb116000 ---p 001c2000 08:02 402655539 /usr/lib64/libc-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb116000-7f77cb11a000 r--p 001c2000 08:02 402655539 /usr/lib64/libc-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb11a000-7f77cb11c000 rw-p 001c6000 08:02 402655539 /usr/lib64/libc-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb11c000-7f77cb121000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb121000-7f77cb138000 r-xp 00000000 08:02 402660476 /usr/lib64/libpthread-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb138000-7f77cb337000 ---p 00017000 08:02 402660476 /usr/lib64/libpthread-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb337000-7f77cb338000 r--p 00016000 08:02 402660476 /usr/lib64/libpthread-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb338000-7f77cb339000 rw-p 00017000 08:02 402660476 /usr/lib64/libpthread-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb339000-7f77cb33d000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb33d000-7f77cb36c000 r-xp 00000000 08:02 402881184 /usr/lib64/libsystemd.so.0.6.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb36c000-7f77cb56c000 ---p 0002f000 08:02 402881184 /usr/lib64/libsystemd.so.0.6.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb56c000-7f77cb56d000 r--p 0002f000 08:02 402881184 /usr/lib64/libsystemd.so.0.6.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb56d000-7f77cb56e000 rw-p 00030000 08:02 402881184 /usr/lib64/libsystemd.so.0.6.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb56e000-7f77cb573000 r-xp 00000000 08:02 403081243 /usr/lib64/libXdmcp.so.6.0.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb573000-7f77cb772000 ---p 00005000 08:02 403081243 /usr/lib64/libXdmcp.so.6.0.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb772000-7f77cb773000 r--p 00004000 08:02 403081243 /usr/lib64/libXdmcp.so.6.0.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb773000-7f77cb774000 rw-p 00005000 08:02 403081243 /usr/lib64/libXdmcp.so.6.0.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb774000-7f77cb79b000 r-xp 00000000 08:02 403086645 /usr/lib64/libxcb.so.1.1.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb79b000-7f77cb99a000 ---p 00027000 08:02 403086645 /usr/lib64/libxcb.so.1.1.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb99a000-7f77cb99b000 r--p 00026000 08:02 403086645 /usr/lib64/libxcb.so.1.1.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb99b000-7f77cb99c000 rw-p 00027000 08:02 403086645 /usr/lib64/libxcb.so.1.1.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb99c000-7f77cb9de000 r-xp 00000000 08:02 402985038 /usr/lib64/libaccountsservice.so.0.0.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cb9de000-7f77cbbde000 ---p 00042000 08:02 402985038 /usr/lib64/libaccountsservice.so.0.0.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cbbde000-7f77cbbe4000 r--p 00042000 08:02 402985038 /usr/lib64/libaccountsservice.so.0.0.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cbbe4000-7f77cbbe5000 rw-p 00048000 08:02 402985038 /usr/lib64/libaccountsservice.so.0.0.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cbbe5000-7f77cbcf9000 r-xp 00000000 08:02 404973051 /usr/lib64/libglib-2.0.so.0.5600.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cbcf9000-7f77cbef8000 ---p 00114000 08:02 404973051 /usr/lib64/libglib-2.0.so.0.5600.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cbef8000-7f77cbef9000 r--p 00113000 08:02 404973051 /usr/lib64/libglib-2.0.so.0.5600.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cbef9000-7f77cbefa000 rw-p 00114000 08:02 404973051 /usr/lib64/libglib-2.0.so.0.5600.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cbefa000-7f77cbefb000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cbefb000-7f77cbf4a000 r-xp 00000000 08:02 404999386 /usr/lib64/libgobject-2.0.so.0.5600.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cbf4a000-7f77cc149000 ---p 0004f000 08:02 404999386 /usr/lib64/libgobject-2.0.so.0.5600.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc149000-7f77cc14a000 r--p 0004e000 08:02 404999386 /usr/lib64/libgobject-2.0.so.0.5600.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc14a000-7f77cc14b000 rw-p 0004f000 08:02 404999386 /usr/lib64/libgobject-2.0.so.0.5600.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc14b000-7f77cc2e0000 r-xp 00000000 08:02 404784178 /usr/lib64/libgio-2.0.so.0.5600.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc2e0000-7f77cc4e0000 ---p 00195000 08:02 404784178 /usr/lib64/libgio-2.0.so.0.5600.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc4e0000-7f77cc4e5000 r--p 00195000 08:02 404784178 /usr/lib64/libgio-2.0.so.0.5600.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc4e5000-7f77cc4e8000 rw-p 0019a000 08:02 404784178 /usr/lib64/libgio-2.0.so.0.5600.1 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc4e8000-7f77cc4ea000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc4ea000-7f77cc4ec000 r-xp 00000000 08:02 403081236 /usr/lib64/libXau.so.6.0.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc4ec000-7f77cc6ec000 ---p 00002000 08:02 403081236 /usr/lib64/libXau.so.6.0.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc6ec000-7f77cc6ed000 r--p 00002000 08:02 403081236 /usr/lib64/libXau.so.6.0.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc6ed000-7f77cc6ee000 rw-p 00003000 08:02 403081236 /usr/lib64/libXau.so.6.0.0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc6ee000-7f77cc710000 r-xp 00000000 08:02 402660745 /usr/lib64/ld-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc8dc000-7f77cc8ed000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc90d000-7f77cc90f000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc90f000-7f77cc910000 r--p 00021000 08:02 402660745 /usr/lib64/ld-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc910000-7f77cc911000 rw-p 00022000 08:02 402660745 /usr/lib64/ld-2.17.so >Jul 05 08:05:49 m72e gdm[1297]: 7f77cc911000-7f77cc912000 rw-p 00000000 00:00 0 >Jul 05 08:05:49 m72e gdm[1297]: 7ffd4b947000-7ffd4b968000 rw-p 00000000 00:00 0 [stack] >Jul 05 08:05:49 m72e gdm[1297]: 7ffd4b9a7000-7ffd4b9a9000 r-xp 00000000 00:00 0 [vdso] >Jul 05 08:05:49 m72e gdm[1297]: ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall] >Jul 05 08:05:50 m72e dbus[753]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Jul 05 08:05:50 m72e systemd[1]: gdm.service: main process exited, code=dumped, status=6/ABRT >Jul 05 08:05:50 m72e systemd[1]: Unit gdm.service entered failed state. >Jul 05 08:05:50 m72e systemd[1]: Triggering OnFailure= dependencies of gdm.service. >Jul 05 08:05:50 m72e systemd[1]: gdm.service failed. >Jul 05 08:05:50 m72e systemd[1]: Starting Terminate Plymouth Boot Screen... >Jul 05 08:05:50 m72e systemd[1]: Started Terminate Plymouth Boot Screen. >Jul 05 08:05:50 m72e abrt-server[3971]: Duplicate: core backtrace >Jul 05 08:05:50 m72e abrt-server[3971]: DUP_OF_DIR: /var/spool/abrt/ccpp-2018-07-03-07:58:18-1313 >Jul 05 08:05:50 m72e abrt-server[3971]: Deleting problem directory ccpp-2018-07-05-08:05:49-1297 (dup of ccpp-2018-07-03-07:58:18-1313) >Jul 05 08:05:50 m72e systemd[1]: gdm.service holdoff time over, scheduling restart. >Jul 05 08:05:50 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 08:05:50 m72e systemd[1]: Stopped GNOME Display Manager. >Jul 05 08:05:50 m72e systemd[1]: Starting GNOME Display Manager... >Jul 05 08:05:50 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 08:05:50 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 08:05:50 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 08:05:50 m72e systemd[1]: Started GNOME Display Manager. >Jul 05 08:05:50 m72e abrt-server[3971]: Email address of sender was not specified. Would you like to do so now? If not, 'user@localhost' is to be used [y/N] >Jul 05 08:05:50 m72e abrt-server[3971]: Email address of receiver was not specified. Would you like to do so now? If not, 'root@localhost' is to be used [y/N] >Jul 05 08:05:50 m72e abrt-server[3971]: Sending an email... >Jul 05 08:05:50 m72e abrt-server[3971]: Sending a notification email to: root@localhost >Jul 05 08:05:50 m72e postfix/sendmail[3997]: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 08:05:50 m72e abrt-server[3971]: send-mail: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 08:05:50 m72e postfix/sendmail[3997]: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 08:05:50 m72e abrt-server[3971]: send-mail: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 08:05:50 m72e abrt-server[3971]: Error running '/bin/mailx' >Jul 05 08:05:50 m72e dbus[753]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Jul 05 08:05:51 m72e setroubleshoot[3967]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/sbin/gdm. For complete SELinux messages run: sealert -l a5294b69-64db-48f8-9f04-5919c22322c6 >Jul 05 08:05:51 m72e python[3967]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/sbin/gdm. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gdm file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 08:05:51 m72e setroubleshoot[3967]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/sbin/gdm. For complete SELinux messages run: sealert -l a5294b69-64db-48f8-9f04-5919c22322c6 >Jul 05 08:05:51 m72e python[3967]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/sbin/gdm. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gdm file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 08:05:51 m72e systemd[1]: Created slice User Slice of gdm. >Jul 05 08:05:51 m72e systemd-logind[774]: New session c2 of user gdm. >Jul 05 08:05:51 m72e systemd[1]: Started Session c2 of user gdm. >Jul 05 08:05:51 m72e gdm-launch-environment][4019]: pam_unix(gdm-launch-environment:session): session opened for user gdm by whot(uid=0) >Jul 05 08:05:51 m72e org.a11y.Bus[4033]: Activating service name='org.a11y.atspi.Registry' >Jul 05 08:05:51 m72e org.a11y.Bus[4033]: Successfully activated service 'org.a11y.atspi.Registry' >Jul 05 08:05:51 m72e org.a11y.atspi.Registry[4043]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry >Jul 05 08:05:51 m72e setroubleshoot[3967]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 08:05:51 m72e python[3967]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 08:05:51 m72e gnome-session[4025]: generating cookie with syscall >Jul 05 08:05:51 m72e gnome-session[4025]: generating cookie with syscall >Jul 05 08:05:51 m72e gnome-session[4025]: generating cookie with syscall >Jul 05 08:05:51 m72e gnome-session[4025]: generating cookie with syscall >Jul 05 08:05:51 m72e setroubleshoot[3967]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 08:05:51 m72e python[3967]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 08:05:51 m72e setroubleshoot[3967]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. For complete SELinux messages run: sealert -l c2670567-6ce1-42fd-bb01-7cdf552b3c40 >Jul 05 08:05:51 m72e python[3967]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that postdrop should be allowed map access on the postdrop file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'postdrop' --raw | audit2allow -M my-postdrop > # semodule -i my-postdrop.pp > >Jul 05 08:05:51 m72e rtkit-daemon[770]: Successfully made thread 4085 of process 4085 (/usr/bin/pulseaudio) owned by '42' high priority at nice level -11. >Jul 05 08:05:51 m72e rtkit-daemon[770]: Supervising 1 threads of 1 processes of 1 users. >Jul 05 08:05:52 m72e rtkit-daemon[770]: Supervising 1 threads of 1 processes of 1 users. >Jul 05 08:05:52 m72e rtkit-daemon[770]: Successfully made thread 4088 of process 4085 (/usr/bin/pulseaudio) owned by '42' RT at priority 5. >Jul 05 08:05:52 m72e rtkit-daemon[770]: Supervising 2 threads of 1 processes of 1 users. >Jul 05 08:05:52 m72e rtkit-daemon[770]: Supervising 2 threads of 1 processes of 1 users. >Jul 05 08:05:52 m72e rtkit-daemon[770]: Successfully made thread 4091 of process 4085 (/usr/bin/pulseaudio) owned by '42' RT at priority 5. >Jul 05 08:05:52 m72e rtkit-daemon[770]: Supervising 3 threads of 1 processes of 1 users. >Jul 05 08:05:52 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Jul 05 08:05:52 m72e systemd[1]: Starting Locale Service... >Jul 05 08:05:52 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.locale1' >Jul 05 08:05:52 m72e systemd[1]: Started Locale Service. >Jul 05 08:05:52 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' >Jul 05 08:05:52 m72e systemd[1]: Starting Location Lookup Service... >Jul 05 08:05:52 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.GeoClue2' >Jul 05 08:05:52 m72e systemd[1]: Started Location Lookup Service. >Jul 05 08:05:52 m72e polkitd[771]: Registered Authentication Agent for unix-session:c2 (system bus name :1.136 [/usr/bin/gnome-shell], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) >Jul 05 08:05:53 m72e spice-vdagent[4139]: Cannot access vdagent virtio channel /dev/virtio-ports/com.redhat.spice.0 >Jul 05 08:05:53 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 08:05:53 m72e gnome-session-binary[4025]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 08:05:53 m72e gnome-shell[4068]: Failed to load background 'file:///usr/share/backgrounds/gnome/adwaita-lock.jpg': Error opening file /usr/share/backgrounds/gnome/adwaita-lock.jpg: No such file or directory >Jul 05 08:05:53 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' >Jul 05 08:05:53 m72e systemd[1]: Starting Hostname Service... >Jul 05 08:05:53 m72e gnome-session-binary[4025]: Entering running state >Jul 05 08:05:53 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.hostname1' >Jul 05 08:05:53 m72e systemd[1]: Started Hostname Service. >Jul 05 08:05:53 m72e dbus[753]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Jul 05 08:05:53 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:11] Failed to parse protect system value, ignoring: strict >Jul 05 08:05:53 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:12] Unknown lvalue 'ProtectKernelTunables' in section 'Service' >Jul 05 08:05:53 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:13] Unknown lvalue 'ProtectControlGroups' in section 'Service' >Jul 05 08:05:53 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:14] Unknown lvalue 'ReadWritePaths' in section 'Service' >Jul 05 08:05:53 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:23] Unknown lvalue 'MemoryDenyWriteExecute' in section 'Service' >Jul 05 08:05:53 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:26] Unknown lvalue 'ProtectKernelModules' in section 'Service' >Jul 05 08:05:53 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:29] Unknown lvalue 'RestrictRealtime' in section 'Service' >Jul 05 08:05:53 m72e systemd[1]: Starting Fingerprint Authentication Daemon... >Jul 05 08:05:53 m72e dbus[753]: [system] Successfully activated service 'net.reactivated.Fprint' >Jul 05 08:05:53 m72e systemd[1]: Started Fingerprint Authentication Daemon. >Jul 05 08:05:53 m72e gnome-shell[4068]: Some code accessed the property 'AuthList' on the module 'authList'. That property was defined with 'let' or 'const' inside the module. This was previously supported, but is not correct according to the ES6 standard. Any symbols to be exported from a module must be defined with 'var'. The property access will work as previously for the time being, but please fix your code anyway. >Jul 05 08:05:53 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.realmd' unit='realmd.service' >Jul 05 08:05:53 m72e systemd[1]: Starting Realm and Domain Configuration... >Jul 05 08:05:53 m72e realmd[4235]: Loaded settings from: /usr/lib64/realmd/realmd-defaults.conf /usr/lib64/realmd/realmd-distro.conf >Jul 05 08:05:53 m72e realmd[4235]: holding daemon: startup >Jul 05 08:05:53 m72e realmd[4235]: starting service >Jul 05 08:05:53 m72e realmd[4235]: connected to bus >Jul 05 08:05:53 m72e realmd[4235]: released daemon: startup >Jul 05 08:05:53 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.realmd' >Jul 05 08:05:53 m72e systemd[1]: Started Realm and Domain Configuration. >Jul 05 08:05:53 m72e realmd[4235]: claimed name on bus: org.freedesktop.realmd >Jul 05 08:05:53 m72e org.gnome.Shell.desktop[4068]: Window manager warning: "XF86RFKill" is not a valid accelerator >Jul 05 08:05:53 m72e gnome-shell[4068]: Error looking up permission: GDBus.Error:org.freedesktop.portal.Error.NotFound: No entry for geolocation >Jul 05 08:05:53 m72e setroubleshoot[3967]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. For complete SELinux messages run: sealert -l 878583e9-e1dd-462e-a486-e30159ea9944 >Jul 05 08:05:53 m72e python[3967]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that gnome-shell should be allowed map access on the hwdb.bin file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell > # semodule -i my-gnomeshell.pp > >Jul 05 08:05:53 m72e gnome-shell[4068]: JS WARNING: [resource:///org/gnome/shell/ui/layout.js 29]: reference to undefined property "MetaWindowX11" >Jul 05 08:05:53 m72e setroubleshoot[3967]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. For complete SELinux messages run: sealert -l 878583e9-e1dd-462e-a486-e30159ea9944 >Jul 05 08:05:53 m72e python[3967]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that gnome-shell should be allowed map access on the hwdb.bin file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell > # semodule -i my-gnomeshell.pp > >Jul 05 08:05:56 m72e setroubleshoot[3967]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. For complete SELinux messages run: sealert -l 878583e9-e1dd-462e-a486-e30159ea9944 >Jul 05 08:05:56 m72e python[3967]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that gnome-shell should be allowed map access on the hwdb.bin file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell > # semodule -i my-gnomeshell.pp > >Jul 05 08:05:58 m72e systemd-logind[774]: New session 5 of user whot. >Jul 05 08:05:58 m72e systemd[1]: Started Session 5 of user whot. >Jul 05 08:05:58 m72e gdm-password][4262]: pam_unix(gdm-password:session): session opened for user whot by whot(uid=0) >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.XSettings.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.XSettings.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Clipboard.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Power.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.PrintNotifications.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Rfkill.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.ScreensaverProxy.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Sharing.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Smartcard.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Sound.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Wacom.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Clipboard.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Color.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Datetime.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Housekeeping.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Keyboard.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.MediaKeys.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Power.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.PrintNotifications.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Rfkill.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.ScreensaverProxy.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Sharing.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Smartcard.desktop' killed by signal 15 >Jul 05 08:06:01 m72e at-spi2-registr[4046]: Failed to send session response The connection is closed >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Sound.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Wacom.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Color.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Datetime.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session[4025]: gnome-session-binary[4025]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Housekeeping.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.Keyboard.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Application 'org.gnome.SettingsDaemon.MediaKeys.desktop' killed by signal 15 >Jul 05 08:06:01 m72e gnome-session-binary[4025]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 08:06:01 m72e polkitd[771]: Unregistered Authentication Agent for unix-session:c2 (system bus name :1.136, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) (disconnected from bus) >Jul 05 08:06:01 m72e gnome-session-f[4285]: Cannot open display: >Jul 05 08:06:01 m72e gdm-password][4288]: unable to log session >Jul 05 08:06:01 m72e com.redhat.imsettings[4298]: [ 1530741961.273122]: IMSettings-Daemon[4367]: INFO: Starting imsettings-daemon... >Jul 05 08:06:01 m72e com.redhat.imsettings[4298]: [ 1530741961.273259]: IMSettings-Daemon[4367]: INFO: [HOME=/home/whot/.config/imsettings] >Jul 05 08:06:01 m72e com.redhat.imsettings[4298]: [ 1530741961.273301]: IMSettings-Daemon[4367]: INFO: [XINPUTRCDIR=/etc/X11/xinit/] >Jul 05 08:06:01 m72e com.redhat.imsettings[4298]: [ 1530741961.273340]: IMSettings-Daemon[4367]: INFO: [XINPUTDIR=/etc/X11/xinit/xinput.d/] >Jul 05 08:06:01 m72e com.redhat.imsettings[4298]: [ 1530741961.273379]: IMSettings-Daemon[4367]: INFO: [MODULEDIR=/usr/lib64/imsettings] >Jul 05 08:06:01 m72e com.redhat.imsettings[4298]: [ 1530741961.273421]: IMSettings-Daemon[4367]: INFO: [MODULES=gsettings, qt] >Jul 05 08:06:01 m72e org.a11y.Bus[4298]: Activating service name='org.a11y.atspi.Registry' >Jul 05 08:06:01 m72e org.a11y.Bus[4298]: Successfully activated service 'org.a11y.atspi.Registry' >Jul 05 08:06:01 m72e org.a11y.atspi.Registry[4484]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry >Jul 05 08:06:01 m72e gnome-session[4288]: generating cookie with syscall >Jul 05 08:06:01 m72e gnome-session[4288]: generating cookie with syscall >Jul 05 08:06:01 m72e gnome-session[4288]: generating cookie with syscall >Jul 05 08:06:01 m72e gnome-session[4288]: generating cookie with syscall >Jul 05 08:06:01 m72e gnome-keyring-daemon[4276]: Gkm: using old keyring directory: /home/whot/.gnome2/keyrings >Jul 05 08:06:01 m72e gnome-keyring-daemon[4276]: Gkm: using old keyring directory: /home/whot/.gnome2/keyrings >Jul 05 08:06:01 m72e gnome-keyring-secrets.desktop[4508]: SSH_AUTH_SOCK=/run/user/13349/keyring/ssh >Jul 05 08:06:01 m72e gnome-keyring-ssh.desktop[4509]: SSH_AUTH_SOCK=/run/user/13349/keyring/ssh >Jul 05 08:06:02 m72e rtkit-daemon[770]: Successfully made thread 4526 of process 4526 (/usr/bin/pulseaudio) owned by '13349' high priority at nice level -11. >Jul 05 08:06:02 m72e rtkit-daemon[770]: Supervising 4 threads of 2 processes of 2 users. >Jul 05 08:06:02 m72e pulseaudio[4526]: [pulseaudio] pid.c: Stale PID file, overwriting. >Jul 05 08:06:02 m72e rtkit-daemon[770]: Supervising 4 threads of 2 processes of 2 users. >Jul 05 08:06:02 m72e rtkit-daemon[770]: Successfully made thread 4529 of process 4526 (/usr/bin/pulseaudio) owned by '13349' RT at priority 5. >Jul 05 08:06:02 m72e rtkit-daemon[770]: Supervising 5 threads of 2 processes of 2 users. >Jul 05 08:06:02 m72e rtkit-daemon[770]: Supervising 5 threads of 2 processes of 2 users. >Jul 05 08:06:02 m72e rtkit-daemon[770]: Successfully made thread 4532 of process 4526 (/usr/bin/pulseaudio) owned by '13349' RT at priority 5. >Jul 05 08:06:02 m72e rtkit-daemon[770]: Supervising 6 threads of 2 processes of 2 users. >Jul 05 08:06:02 m72e dbus[753]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' >Jul 05 08:06:03 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' >Jul 05 08:06:03 m72e systemd[1]: Starting Location Lookup Service... >Jul 05 08:06:03 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.GeoClue2' >Jul 05 08:06:03 m72e systemd[1]: Started Location Lookup Service. >Jul 05 08:06:03 m72e polkitd[771]: Registered Authentication Agent for unix-session:5 (system bus name :1.163 [/usr/bin/gnome-shell], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) >Jul 05 08:06:03 m72e goa-daemon[4603]: goa-daemon version 3.28.0 starting >Jul 05 08:06:03 m72e goa-identity-se[4622]: GoaKerberosIdentityManager: Using polling for change notification for credential cache type 'KEYRING' >Jul 05 08:06:03 m72e org.gtk.vfs.AfcVolumeMonitor[4298]: Volume monitor alive >Jul 05 08:06:03 m72e gnome-shell[4516]: Some code accessed the property '_modes' on the module 'sessionMode'. That property was defined with 'let' or 'const' inside the module. This was previously supported, but is not correct according to the ES6 standard. Any symbols to be exported from a module must be defined with 'var'. The property access will work as previously for the time being, but please fix your code anyway. >Jul 05 08:06:03 m72e spice-vdagent[4684]: Cannot access vdagent virtio channel /dev/virtio-ports/com.redhat.spice.0 >Jul 05 08:06:03 m72e gnome-session-binary[4288]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 08:06:03 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 08:06:03 m72e kernel: traps: gsd-account[4653] trap int3 ip:7ffb49a59b11 sp:7ffd2961d870 error:0 >Jul 05 08:06:03 m72e gsd-account[4653]: Settings schema 'org.gnome.settings-daemon.plugins.account' is not installed >Jul 05 08:06:03 m72e gsd-xsettings[4670]: Failed to get current display configuration state: GDBus.Error:org.freedesktop.DBus.Error.NameHasNoOwner: Name "org.gnome.Mutter.DisplayConfig" does not exist >Jul 05 08:06:03 m72e kernel: rfkill: input handler disabled >Jul 05 08:06:03 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.NetworkManager' unit='dbus-org.freedesktop.NetworkManager.service' >Jul 05 08:06:03 m72e dbus[753]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.NetworkManager.service': Unit not found. >Jul 05 08:06:03 m72e gsd-rfkill[4661]: Failed to acquire NetworkManager proxy: Error calling StartServiceByName for org.freedesktop.NetworkManager: GDBus.Error:org.freedesktop.systemd1.NoSuchUnit: Unit not found. >Jul 05 08:06:03 m72e gsd-housekeepin[4708]: Loading NVML: libnvidia-ml.so: cannot open shared object file: No such file or directory >Jul 05 08:06:03 m72e abrt-hook-ccpp[4723]: Process 4653 (gsd-account) of user 13349 killed by SIGTRAP - dumping core >Jul 05 08:06:04 m72e gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 08:06:04 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 08:06:04 m72e gsd-media-keys[4713]: g_variant_get_va: assertion 'value != NULL' failed >Jul 05 08:06:04 m72e gsd-media-keys[4713]: g_variant_unref: assertion 'value != NULL' failed >Jul 05 08:06:04 m72e setroubleshoot[3967]: SELinux is preventing /usr/libexec/gdm-session-worker from 'read, append' accesses on the file session.log. For complete SELinux messages run: sealert -l 508ab26c-ffb6-4759-84e1-90e0199490bb >Jul 05 08:06:04 m72e kernel: traps: gsd-account[4768] trap int3 ip:7f55d21d6b11 sp:7fffa3145360 error:0 >Jul 05 08:06:04 m72e gsd-account[4768]: Settings schema 'org.gnome.settings-daemon.plugins.account' is not installed >Jul 05 08:06:04 m72e python[3967]: SELinux is preventing /usr/libexec/gdm-session-worker from 'read, append' accesses on the file session.log. > > ***** Plugin catchall_labels (83.8 confidence) suggests ******************* > > If you want to allow gdm-session-worker to have read append access on the session.log file > Then you need to change the label on session.log > Do > # semanage fcontext -a -t FILE_TYPE 'session.log' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, admin_crontab_tmp_t, alsa_tmp_t, amanda_tmp_t, anon_inodefs_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, auditadm_sudo_tmp_t, auth_cache_t, auth_home_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cgroup_t, chrome_sandbox_tmp_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_tmp_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_tmp_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_runtime_tmp_t, couchdb_tmp_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_lpd_tmp_t, cupsd_tmp_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, etc_runtime_t, exim_tmp_t, fail2ban_tmp_t, faillog_t, fenced_tmp_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, initrc_var_run_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, iscsi_tmp_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, lastlog_t, ldconfig_tmp_t, livecd_tmp_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_tmp_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, netutils_tmp_t, neutron_tmp_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, pam_var_console_t, pam_var_run_t, passenger_tmp_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_tmp_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_tmp_t, prelude_lml_tmp_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rsync_tmp_t, rtas_errd_tmp_t, samba_net_tmp_t, sbd_tmpfs_t, sblim_tmp_t, secadm_sudo_tmp_t, sectool_tmp_t, security_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, ssh_agent_tmp_t, ssh_keygen_tmp_t, ssh_tmpfs_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_cronjob_tmp_t, system_dbusd_tmp_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_passwd_var_run_t, targetd_tmp_t, tcpd_tmp_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_tmp_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, tgtd_tmp_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, user_cron_spool_t, user_fonts_t, user_mail_tmp_t, user_tmp_t, uucpd_tmp_t, var_auth_t, var_spool_t, varnishd_tmp_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmtools_tmp_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wireshark_tmp_t, wireshark_tmpfs_t, wtmp_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_lock_t, xdm_log_t, xdm_rw_etc_t, xdm_spool_t, xdm_tmpfs_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenstored_tmp_t, xkb_var_lib_t, xserver_log_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t. > Then execute: > restorecon -v 'session.log' > > > ***** Plugin catchall (17.1 confidence) suggests ************************** > > If you believe that gdm-session-worker should be allowed read append access on the session.log file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdm-session-wor' --raw | audit2allow -M my-gdmsessionwor > # semodule -i my-gdmsessionwor.pp > >Jul 05 08:06:04 m72e abrt-hook-ccpp[4772]: Process 4768 (gsd-account) of user 13349 killed by SIGTRAP - ignoring (repeated crash) >Jul 05 08:06:04 m72e gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 08:06:04 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 08:06:04 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.Account.desktop' respawning too quickly >Jul 05 08:06:04 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: Error on restarting session managed app: Component 'org.gnome.SettingsDaemon.Account.desktop' crashing too quickly >Jul 05 08:06:04 m72e gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.Account.desktop' respawning too quickly >Jul 05 08:06:04 m72e gnome-session-binary[4288]: WARNING: Error on restarting session managed app: Component 'org.gnome.SettingsDaemon.Account.desktop' crashing too quickly >Jul 05 08:06:04 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc: Permission denied >Jul 05 08:06:04 m72e gsd-color[4704]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc: Permission denied >Jul 05 08:06:04 m72e gnome-shell[4516]: JS WARNING: [resource:///org/gnome/shell/ui/workspaceThumbnail.js 887]: reference to undefined property "_switchWorkspaceNotifyId" >Jul 05 08:06:04 m72e abrt-server[4766]: Duplicate: core backtrace >Jul 05 08:06:04 m72e abrt-server[4766]: DUP_OF_DIR: /var/spool/abrt/ccpp-2018-07-02-09:55:59-10206 >Jul 05 08:06:04 m72e abrt-server[4766]: Deleting problem directory ccpp-2018-07-05-08:06:03-4653 (dup of ccpp-2018-07-02-09:55:59-10206) >Jul 05 08:06:04 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc: Permission denied >Jul 05 08:06:04 m72e gsd-color[4704]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc: Permission denied >Jul 05 08:06:04 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc: Permission denied >Jul 05 08:06:04 m72e gsd-color[4704]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc: Permission denied >Jul 05 08:06:04 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc: Permission denied >Jul 05 08:06:04 m72e gsd-color[4704]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc: Permission denied >Jul 05 08:06:04 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc: Permission denied >Jul 05 08:06:04 m72e gsd-color[4704]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc: Permission denied >Jul 05 08:06:04 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 08:06:04 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 08:06:04 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 08:06:04 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 08:06:04 m72e abrt-server[4766]: Email address of sender was not specified. Would you like to do so now? If not, 'user@localhost' is to be used [y/N] >Jul 05 08:06:04 m72e abrt-server[4766]: Email address of receiver was not specified. Would you like to do so now? If not, 'root@localhost' is to be used [y/N] >Jul 05 08:06:04 m72e abrt-server[4766]: Sending an email... >Jul 05 08:06:04 m72e abrt-server[4766]: Sending a notification email to: root@localhost >Jul 05 08:06:04 m72e abrt-server[4766]: send-mail: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 08:06:04 m72e postfix/sendmail[4798]: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 08:06:04 m72e abrt-server[4766]: send-mail: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 08:06:04 m72e postfix/sendmail[4798]: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 08:06:04 m72e abrt-server[4766]: Error running '/bin/mailx' >Jul 05 08:06:04 m72e setroubleshoot[3967]: SELinux is preventing /usr/libexec/gdm-session-worker from write access on the directory gdm. For complete SELinux messages run: sealert -l 62b4a3f6-9761-4f8f-9235-10f811608807 >Jul 05 08:06:04 m72e python[3967]: SELinux is preventing /usr/libexec/gdm-session-worker from write access on the directory gdm. > > ***** Plugin catchall_labels (83.8 confidence) suggests ******************* > > If you want to allow gdm-session-worker to have write access on the gdm directory > Then you need to change the label on gdm > Do > # semanage fcontext -a -t FILE_TYPE 'gdm' > where FILE_TYPE is one of the following: abrt_var_cache_t, admin_home_t, alsa_home_t, antivirus_home_t, audio_home_t, auth_cache_t, auth_home_t, cache_home_t, cgroup_t, chrome_sandbox_home_t, config_home_t, container_home_t, cvs_home_t, data_home_t, dbus_home_t, etc_t, faillog_t, fetchmail_home_t, fonts_cache_t, gconf_home_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, gnome_home_t, gpg_secret_t, gstreamer_home_t, home_bin_t, home_cert_t, httpd_user_content_t, httpd_user_script_exec_t, icc_data_home_t, iceauth_home_t, init_var_run_t, irc_home_t, irc_tmp_t, irssi_home_t, kismet_home_t, krb5_home_t, krb5_host_rcache_t, local_login_home_t, locale_t, mail_home_rw_t, mail_home_t, mandb_home_t, mozilla_home_t, mozilla_plugin_rw_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mpd_home_t, mpd_user_data_t, mplayer_home_t, mysqld_home_t, openshift_var_lib_t, pam_var_console_t, pam_var_run_t, polipo_cache_home_t, polipo_config_home_t, procmail_home_t, pulseaudio_home_t, rlogind_home_t, root_t, rssh_ro_t, rssh_rw_t, sandbox_file_t, screen_home_t, spamc_home_t, speech-dispatcher_home_t, ssh_home_t, svirt_home_t, systemd_home_t, systemd_passwd_var_run_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_sunshine_home_t, texlive_home_t, thumb_home_t, tmp_t, tmpfs_t, tvtime_home_t, uml_ro_t, uml_rw_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_dir_t, user_home_t, user_tmp_t, usr_t, var_auth_t, var_lib_t, var_lock_t, var_log_t, var_run_t, var_spool_t, var_t, virt_content_t, virt_home_t, vmware_conf_t, vmware_file_t, wine_home_t, wireshark_home_t, xauth_home_t, xdm_home_t, xdm_log_t, xdm_rw_etc_t, xdm_spool_t, xdm_tmpfs_t, xdm_var_lib_t, xdm_var_run_t, xkb_var_lib_t, xserver_log_t. > Then execute: > restorecon -v 'gdm' > > > ***** Plugin catchall (17.1 confidence) suggests ************************** > > If you believe that gdm-session-worker should be allowed write access on the gdm directory by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdm-session-wor' --raw | audit2allow -M my-gdmsessionwor > # semodule -i my-gdmsessionwor.pp > >Jul 05 08:06:04 m72e gnome-shell[4516]: Failed to load background 'file:///usr/share/backgrounds/gnome/adwaita-lock.jpg': Error opening file /usr/share/backgrounds/gnome/adwaita-lock.jpg: No such file or directory >Jul 05 08:06:04 m72e setroubleshoot[3967]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. For complete SELinux messages run: sealert -l 6669b36f-d550-4692-840a-03526ca0d447 >Jul 05 08:06:04 m72e python[3967]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gsd-account file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 08:06:04 m72e setroubleshoot[3967]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. For complete SELinux messages run: sealert -l 6669b36f-d550-4692-840a-03526ca0d447 >Jul 05 08:06:04 m72e python[3967]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gsd-account file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 08:06:05 m72e gnome-shell[4516]: Error looking up permission: GDBus.Error:org.freedesktop.portal.Error.NotFound: No entry for geolocation >Jul 05 08:06:05 m72e setroubleshoot[3967]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 08:06:05 m72e python[3967]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-0bac1383fb4abc86437df0bfd31023b9.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-0bac1383fb4abc86437df0bfd31023b9.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 08:06:05 m72e org.gnome.Shell.desktop[4516]: Window manager warning: "XF86RFKill" is not a valid accelerator >Jul 05 08:06:05 m72e setroubleshoot[3967]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 08:06:05 m72e python[3967]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-0c2d933e282feb5e95379b2caa320512.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-0c2d933e282feb5e95379b2caa320512.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 08:06:05 m72e setroubleshoot[3967]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 08:06:05 m72e python[3967]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-425bbe74e56050940c54b0f2931c5aec.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-425bbe74e56050940c54b0f2931c5aec.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 08:06:05 m72e gnome-shell[4516]: GNOME Shell started at Thu Jul 05 2018 08:06:03 GMT+1000 (AEST) >Jul 05 08:06:05 m72e setroubleshoot[3967]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 08:06:05 m72e python[3967]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-9d03684165204e087fc5b6a268ff58f2.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-9d03684165204e087fc5b6a268ff58f2.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 08:06:05 m72e setroubleshoot[3967]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 08:06:05 m72e python[3967]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 08:06:06 m72e setroubleshoot[3967]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 08:06:06 m72e python[3967]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 08:06:06 m72e setroubleshoot[3967]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 08:06:06 m72e python[3967]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 08:06:07 m72e setroubleshoot[3967]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. For complete SELinux messages run: sealert -l c2670567-6ce1-42fd-bb01-7cdf552b3c40 >Jul 05 08:06:07 m72e python[3967]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that postdrop should be allowed map access on the postdrop file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'postdrop' --raw | audit2allow -M my-postdrop > # semodule -i my-postdrop.pp > >Jul 05 08:06:08 m72e telepathy-haze[4625]: Exiting >Jul 05 08:06:08 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: Unable to bind hide_window key, another instance/window has it. >Jul 05 08:06:08 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 08:06:08 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:06:08 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:06:16 m72e thunderbird.desktop[4959]: [calBackendLoader] Using Thunderbird's builtin libical backend >Jul 05 08:06:21 m72e systemd-logind[774]: Removed session c2. >Jul 05 08:06:21 m72e systemd[1]: Removed slice User Slice of gdm. >Jul 05 08:06:27 m72e dbus[753]: [system] Failed to activate service 'org.bluez': timed out >Jul 05 08:06:27 m72e pulseaudio[4526]: [pulseaudio] bluez5-util.c: GetManagedObjects() failed: org.freedesktop.DBus.Error.NoReply: Did not receive a reply. Possible causes include: the remote application did not send a reply, the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken. >Jul 05 08:06:53 m72e realmd[4235]: quitting realmd service after timeout >Jul 05 08:06:53 m72e realmd[4235]: stopping service >Jul 05 08:07:34 m72e gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' failed to register before timeout >Jul 05 08:07:34 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' failed to register before timeout >Jul 05 08:07:34 m72e vmware-user.desktop[5517]: vmware-user: could not open /proc/fs/vmblock/dev >Jul 05 08:07:34 m72e gnome-session-binary[4288]: Entering running state >Jul 05 08:07:34 m72e gnome-shell[4516]: STACK_OP_RAISE_ABOVE: window 0xc001ff not in stack >Jul 05 08:07:34 m72e com.redhat.imsettings[4298]: [ 1530742054.446744]: IMSettings-Daemon[4367]: INFO: Attempting to switch IM to none [lang=en_AU.utf8, update=false] >Jul 05 08:07:34 m72e libcanberra-login-sound.desktop[5522]: Failed to play sound: File or data not found >Jul 05 08:07:34 m72e gnome-shell[4516]: STACK_OP_ADD: window 0x3600001 already in stack >Jul 05 08:07:34 m72e gnome-shell[4516]: STACK_OP_ADD: window 0x3600001 already in stack >Jul 05 08:07:34 m72e com.redhat.imsettings[4298]: No such schema âorg.gnome.settings-daemon.plugins.keyboardâ >Jul 05 08:07:34 m72e com.redhat.imsettings[4298]: [ 1530742054.595701]: IMSettings-Daemon[4367]: WARNING **: Current desktop isn't targeted by IMSettings. >Jul 05 08:07:34 m72e imsettings-start.desktop[5516]: GDBus.Error:org.gtk.GDBus.UnmappedGError.Quark._imsettings_2derror_2dquark.Code5: Current desktop isn't targeted by IMSettings. >Jul 05 08:07:34 m72e com.redhat.imsettings[4298]: Exiting... >Jul 05 08:07:34 m72e com.redhat.imsettings[4298]: [ 1530742054.599821]: IMSettings-Daemon[4367]: INFO: Unloading imesttings module: qt >Jul 05 08:07:34 m72e com.redhat.imsettings[4298]: [ 1530742054.599961]: IMSettings-Daemon[4367]: INFO: Unloading imesttings module: gsettings >Jul 05 08:07:34 m72e com.redhat.imsettings[4298]: [ 1530742054.600033]: IMSettings-Daemon[4367]: INFO: imsettings-daemon is shut down. >Jul 05 08:07:34 m72e gnome-shell[4516]: JS WARNING: [/usr/share/gnome-shell/extensions/top-icons@gnome-shell-extensions.gcampax.github.com/extension.js 118]: reference to undefined property "width" >Jul 05 08:07:34 m72e gnome-software[5509]: enabled plugins: desktop-categories, packagekit-local, packagekit-offline, packagekit-proxy, packagekit-refresh, packagekit-upgrade, packagekit, shell-extensions, systemd-updates, packagekit-url-to-app, fwupd, os-release, appstream, steam, desktop-menu-path, flatpak, hardcoded-blacklist, hardcoded-featured, hardcoded-popular, modalias, packagekit-refine, generic-updates, rewrite-resource, icons, odrs, packagekit-history, provenance, repos, key-colors, provenance-license, packagekit-refine-repos, key-colors-metadata >Jul 05 08:07:34 m72e gnome-software[5509]: disabled plugins: dpkg, dummy, fedora-pkgdb-collections, epiphany >Jul 05 08:07:35 m72e gnome-software[5509]: failed to call gs_plugin_add_updates_historical on packagekit-offline: cannot find repo mhlavink-developerdashboard >Jul 05 08:07:37 m72e PackageKit[1849]: get-updates transaction /2328_cdecdada from uid 13349 finished with success after 2758ms >Jul 05 08:07:37 m72e gnome-software[5509]: hiding category games featured applications: found only 0 to show, need at least 9 >Jul 05 08:07:37 m72e gnome-software[5509]: hiding category productivity featured applications: found only 0 to show, need at least 9 >Jul 05 08:07:37 m72e gnome-software[5509]: top-icons@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 08:07:37 m72e gnome-software[5509]: apps-menu@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 08:07:37 m72e gnome-software[5509]: window-list@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 08:07:37 m72e gnome-software[5509]: launch-new-instance@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 08:07:37 m72e gnome-software[5509]: places-menu@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 08:07:37 m72e gnome-software[5509]: alternate-tab@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 08:07:38 m72e PackageKit[1849]: resolve transaction /2329_dcecaacc from uid 13349 finished with success after 644ms >Jul 05 08:07:38 m72e PackageKit[1849]: resolve transaction /2330_aebcccbe from uid 13349 finished with success after 54ms >Jul 05 08:07:38 m72e PackageKit[1849]: resolve transaction /2331_cccbbebc from uid 13349 finished with success after 36ms >Jul 05 08:07:38 m72e gnome-software[5509]: Only 5 apps for popular list, hiding >Jul 05 08:07:38 m72e PackageKit[1849]: resolve transaction /2332_dddddcbb from uid 13349 finished with success after 94ms >Jul 05 08:07:39 m72e PackageKit[1849]: resolve transaction /2333_bbadacad from uid 13349 finished with success after 147ms >Jul 05 08:07:41 m72e PackageKit[1849]: get-update-detail transaction /2334_cbccaacd from uid 13349 finished with success after 2208ms >Jul 05 08:07:41 m72e PackageKit[1849]: search-file transaction /2335_bbcbedbe from uid 13349 finished with success after 13ms >Jul 05 08:07:41 m72e gnome-software[5509]: Failed to find one package for vmware-player.desktop, /usr/share/applications/vmware-player.desktop, [0] >Jul 05 08:07:41 m72e PackageKit[1849]: search-file transaction /2336_bdececdb from uid 13349 finished with success after 47ms >Jul 05 08:07:41 m72e PackageKit[1849]: search-file transaction /2337_eeeaedaa from uid 13349 finished with success after 46ms >Jul 05 08:07:41 m72e PackageKit[1849]: search-file transaction /2338_debeacce from uid 13349 finished with success after 48ms >Jul 05 08:07:41 m72e PackageKit[1849]: search-file transaction /2339_accbadda from uid 13349 finished with success after 47ms >Jul 05 08:07:41 m72e PackageKit[1849]: search-file transaction /2340_cdcababa from uid 13349 finished with success after 47ms >Jul 05 08:07:42 m72e PackageKit[1849]: search-file transaction /2341_bbcdceae from uid 13349 finished with success after 46ms >Jul 05 08:07:42 m72e PackageKit[1849]: search-file transaction /2342_cdbddbcc from uid 13349 finished with success after 48ms >Jul 05 08:07:42 m72e PackageKit[1849]: search-file transaction /2343_ceedcbbb from uid 13349 finished with success after 47ms >Jul 05 08:07:42 m72e PackageKit[1849]: search-file transaction /2344_bedccdee from uid 13349 finished with success after 47ms >Jul 05 08:07:42 m72e PackageKit[1849]: search-file transaction /2345_adabcedd from uid 13349 finished with success after 47ms >Jul 05 08:07:42 m72e PackageKit[1849]: search-file transaction /2346_dceadaad from uid 13349 finished with success after 46ms >Jul 05 08:07:42 m72e PackageKit[1849]: search-file transaction /2347_deaaaead from uid 13349 finished with success after 47ms >Jul 05 08:07:42 m72e PackageKit[1849]: search-file transaction /2348_aaebbbbb from uid 13349 finished with success after 47ms >Jul 05 08:07:43 m72e PackageKit[1849]: search-file transaction /2349_ebeaeddb from uid 13349 finished with success after 47ms >Jul 05 08:07:43 m72e PackageKit[1849]: search-file transaction /2350_bbaadccb from uid 13349 finished with success after 47ms >Jul 05 08:07:43 m72e PackageKit[1849]: search-file transaction /2351_eecbbbeb from uid 13349 finished with success after 46ms >Jul 05 08:07:43 m72e PackageKit[1849]: search-file transaction /2352_eddeaaea from uid 13349 finished with success after 47ms >Jul 05 08:07:43 m72e PackageKit[1849]: search-file transaction /2353_bbadcaae from uid 13349 finished with success after 48ms >Jul 05 08:07:44 m72e PackageKit[1849]: search-file transaction /2354_beadebbe from uid 13349 finished with success after 46ms >Jul 05 08:07:44 m72e PackageKit[1849]: search-file transaction /2355_dbeceadd from uid 13349 finished with success after 48ms >Jul 05 08:07:44 m72e PackageKit[1849]: get-details transaction /2356_aeaaedba from uid 13349 finished with success after 98ms >Jul 05 08:09:39 m72e systemd[1]: Starting Cleanup of Temporary Directories... >Jul 05 08:09:40 m72e systemd[1]: Started Cleanup of Temporary Directories. >Jul 05 08:10:01 m72e systemd[1]: Started Session 6 of user root. >Jul 05 08:10:01 m72e CROND[5695]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 08:11:17 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: Unable to bind hide_window key, another instance/window has it. >Jul 05 08:11:17 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 08:11:17 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:11:17 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:11:34 m72e dbus[753]: [system] Activating service name='com.redhat.SubscriptionManager' (using servicehelper) >Jul 05 08:11:36 m72e dbus[753]: [system] Successfully activated service 'com.redhat.SubscriptionManager' >Jul 05 08:12:09 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: Unable to bind hide_window key, another instance/window has it. >Jul 05 08:12:09 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 08:12:09 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:12:09 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:20:01 m72e systemd[1]: Started Session 7 of user root. >Jul 05 08:20:01 m72e CROND[6112]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 08:30:01 m72e systemd[1]: Started Session 8 of user root. >Jul 05 08:30:01 m72e CROND[6331]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 08:32:01 m72e anacron[2894]: Job `cron.daily' started >Jul 05 08:32:01 m72e run-parts(/etc/cron.daily)[6388]: starting etckeeper >Jul 05 08:32:02 m72e run-parts(/etc/cron.daily)[6401]: finished etckeeper >Jul 05 08:32:02 m72e run-parts(/etc/cron.daily)[6403]: starting google-chrome >Jul 05 08:32:02 m72e run-parts(/etc/cron.daily)[6444]: finished google-chrome >Jul 05 08:32:02 m72e run-parts(/etc/cron.daily)[6446]: starting logrotate >Jul 05 08:32:02 m72e run-parts(/etc/cron.daily)[6451]: finished logrotate >Jul 05 08:32:02 m72e run-parts(/etc/cron.daily)[6453]: starting man-db.cron >Jul 05 08:32:14 m72e run-parts(/etc/cron.daily)[6462]: finished man-db.cron >Jul 05 08:32:14 m72e run-parts(/etc/cron.daily)[6464]: starting mlocate >Jul 05 08:34:26 m72e run-parts(/etc/cron.daily)[6610]: finished mlocate >Jul 05 08:34:26 m72e run-parts(/etc/cron.daily)[6612]: starting rhsmd >Jul 05 08:34:26 m72e rhsmd[6615]: In order for Subscription Manager to provide your system with updates, your system must be registered with the Customer Portal. Please enter your Red Hat login to ensure your system is up-to-date. >Jul 05 08:34:26 m72e run-parts(/etc/cron.daily)[6621]: finished rhsmd >Jul 05 08:34:26 m72e anacron[2894]: Job `cron.daily' terminated >Jul 05 08:34:26 m72e anacron[2894]: Normal exit (1 job run) >Jul 05 08:34:26 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 08:40:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 08:40:01 m72e systemd[1]: Started Session 9 of user root. >Jul 05 08:40:01 m72e CROND[6982]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 08:40:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 08:49:23 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: Unable to bind hide_window key, another instance/window has it. >Jul 05 08:49:23 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 08:49:23 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:49:23 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:49:48 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: Unable to bind hide_window key, another instance/window has it. >Jul 05 08:49:48 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 08:49:48 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:49:48 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:50:02 m72e systemd[1]: Created slice User Slice of root. >Jul 05 08:50:02 m72e systemd[1]: Started Session 10 of user root. >Jul 05 08:50:02 m72e CROND[7349]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 08:50:02 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 08:51:27 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: Unable to bind hide_window key, another instance/window has it. >Jul 05 08:51:27 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 08:51:27 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:51:27 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 08:57:06 m72e gnome-shell[4516]: JS WARNING: [resource:///org/gnome/shell/ui/popupMenu.js 717]: reference to undefined property "_delegate" >Jul 05 08:57:07 m72e gnome-shell[4516]: g_array_unref: assertion 'array' failed >Jul 05 09:00:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 09:00:01 m72e systemd[1]: Started Session 11 of user root. >Jul 05 09:00:01 m72e CROND[7726]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 09:00:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 09:01:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 09:01:01 m72e systemd[1]: Started Session 12 of user root. >Jul 05 09:01:01 m72e CROND[7773]: (root) CMD (run-parts /etc/cron.hourly) >Jul 05 09:01:01 m72e run-parts(/etc/cron.hourly)[7777]: starting 0anacron >Jul 05 09:01:01 m72e run-parts(/etc/cron.hourly)[7785]: finished 0anacron >Jul 05 09:01:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 09:10:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 09:10:01 m72e systemd[1]: Started Session 13 of user root. >Jul 05 09:10:01 m72e CROND[7903]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 09:10:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 09:14:40 m72e dbus[753]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Jul 05 09:14:40 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:11] Failed to parse protect system value, ignoring: strict >Jul 05 09:14:40 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:12] Unknown lvalue 'ProtectKernelTunables' in section 'Service' >Jul 05 09:14:40 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:13] Unknown lvalue 'ProtectControlGroups' in section 'Service' >Jul 05 09:14:40 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:14] Unknown lvalue 'ReadWritePaths' in section 'Service' >Jul 05 09:14:40 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:23] Unknown lvalue 'MemoryDenyWriteExecute' in section 'Service' >Jul 05 09:14:40 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:26] Unknown lvalue 'ProtectKernelModules' in section 'Service' >Jul 05 09:14:40 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:29] Unknown lvalue 'RestrictRealtime' in section 'Service' >Jul 05 09:14:40 m72e systemd[1]: Starting Fingerprint Authentication Daemon... >Jul 05 09:14:40 m72e dbus[753]: [system] Successfully activated service 'net.reactivated.Fprint' >Jul 05 09:14:40 m72e systemd[1]: Started Fingerprint Authentication Daemon. >Jul 05 09:14:40 m72e gnome-shell[4516]: Some code accessed the property 'AuthList' on the module 'authList'. That property was defined with 'let' or 'const' inside the module. This was previously supported, but is not correct according to the ES6 standard. Any symbols to be exported from a module must be defined with 'var'. The property access will work as previously for the time being, but please fix your code anyway. >Jul 05 09:14:42 m72e gdm-password][7965]: gkr-pam: unlocked login keyring >Jul 05 09:14:42 m72e gdm[3984]: *** Error in `/usr/sbin/gdm': double free or corruption (fasttop): 0x0000556dbd72bde0 *** >Jul 05 09:14:42 m72e gdm[3984]: ======= Backtrace: ========= >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libc.so.6(+0x81489)[0x7f18a46d2489] >Jul 05 09:14:42 m72e gdm[3984]: /usr/sbin/gdm(+0x1a552)[0x556dbb6ec552] >Jul 05 09:14:42 m72e gdm[3984]: /usr/sbin/gdm(+0x1a653)[0x556dbb6ec653] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libgobject-2.0.so.0(g_cclosure_marshal_VOID__STRINGv+0x99)[0x7f18a580a899] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libgobject-2.0.so.0(+0xfbb7)[0x7f18a5807bb7] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libgobject-2.0.so.0(g_signal_emit_valist+0x477)[0x7f18a5821657] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libgobject-2.0.so.0(g_signal_emit+0x8f)[0x7f18a58222df] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libffi.so.6(ffi_call_unix64+0x4c)[0x7f18a444edcc] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libffi.so.6(ffi_call+0x1f5)[0x7f18a444e6f5] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libgobject-2.0.so.0(g_cclosure_marshal_generic+0x1f8)[0x7f18a58081c8] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libgobject-2.0.so.0(g_closure_invoke+0x138)[0x7f18a5807988] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libgobject-2.0.so.0(+0x2205d)[0x7f18a581a05d] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libgobject-2.0.so.0(g_signal_emitv+0x231)[0x7f18a5821171] >Jul 05 09:14:42 m72e gdm[3984]: /usr/sbin/gdm(+0x3e803)[0x556dbb710803] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libffi.so.6(ffi_call_unix64+0x4c)[0x7f18a444edcc] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libffi.so.6(ffi_call+0x1f5)[0x7f18a444e6f5] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libgobject-2.0.so.0(g_cclosure_marshal_generic+0x1f8)[0x7f18a58081c8] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libgobject-2.0.so.0(g_closure_invoke+0x138)[0x7f18a5807988] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libgobject-2.0.so.0(+0x21e1b)[0x7f18a5819e1b] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libgobject-2.0.so.0(g_signal_emit_valist+0xe11)[0x7f18a5821ff1] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libgobject-2.0.so.0(g_signal_emit+0x8f)[0x7f18a58222df] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libgio-2.0.so.0(+0xcbcec)[0x7f18a5b13cec] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libgio-2.0.so.0(+0xbb2a5)[0x7f18a5b032a5] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libglib-2.0.so.0(+0x48c77)[0x7f18a552ac77] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libglib-2.0.so.0(g_main_context_dispatch+0x159)[0x7f18a552e049] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libglib-2.0.so.0(+0x4c3a8)[0x7f18a552e3a8] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libglib-2.0.so.0(g_main_loop_run+0x6a)[0x7f18a552e67a] >Jul 05 09:14:42 m72e gdm[3984]: /usr/sbin/gdm(+0xfcd1)[0x556dbb6e1cd1] >Jul 05 09:14:42 m72e gdm[3984]: /lib64/libc.so.6(__libc_start_main+0xf5)[0x7f18a46733d5] >Jul 05 09:14:42 m72e gdm[3984]: /usr/sbin/gdm(+0xff59)[0x556dbb6e1f59] >Jul 05 09:14:42 m72e gdm[3984]: ======= Memory map: ======== >Jul 05 09:14:42 m72e gdm[3984]: 556dbb6d2000-556dbb733000 r-xp 00000000 08:02 404246096 /usr/sbin/gdm >Jul 05 09:14:42 m72e gdm[3984]: 556dbb933000-556dbb939000 r--p 00061000 08:02 404246096 /usr/sbin/gdm >Jul 05 09:14:42 m72e gdm[3984]: 556dbb939000-556dbb93a000 rw-p 00067000 08:02 404246096 /usr/sbin/gdm >Jul 05 09:14:42 m72e gdm[3984]: 556dbd6d8000-556dbd757000 rw-p 00000000 00:00 0 [heap] >Jul 05 09:14:42 m72e gdm[3984]: 7f1884000000-7f1884022000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f1884022000-7f1888000000 ---p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f188c000000-7f188c022000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f188c022000-7f1890000000 ---p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f1890000000-7f1890021000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f1890021000-7f1894000000 ---p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f1894000000-7f1894021000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f1894021000-7f1898000000 ---p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f1898b24000-7f1898b25000 ---p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f1898b25000-7f1899325000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f1899325000-7f1899326000 ---p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f1899326000-7f1899b26000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f1899b26000-7f1899b27000 ---p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f1899b27000-7f189a327000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f189a327000-7f189a328000 ---p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f189a328000-7f189ab28000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f189ab28000-7f189ab34000 r-xp 00000000 08:02 404810219 /usr/lib64/libnss_files-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f189ab34000-7f189ad33000 ---p 0000c000 08:02 404810219 /usr/lib64/libnss_files-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f189ad33000-7f189ad34000 r--p 0000b000 08:02 404810219 /usr/lib64/libnss_files-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f189ad34000-7f189ad35000 rw-p 0000c000 08:02 404810219 /usr/lib64/libnss_files-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f189ad35000-7f189ad3b000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f189ad3b000-7f18a1265000 r--p 00000000 08:02 134232878 /usr/lib/locale/locale-archive >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1265000-7f18a1274000 r-xp 00000000 08:02 402759191 /usr/lib64/libbz2.so.1.0.6 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1274000-7f18a1473000 ---p 0000f000 08:02 402759191 /usr/lib64/libbz2.so.1.0.6 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1473000-7f18a1474000 r--p 0000e000 08:02 402759191 /usr/lib64/libbz2.so.1.0.6 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1474000-7f18a1475000 rw-p 0000f000 08:02 402759191 /usr/lib64/libbz2.so.1.0.6 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1475000-7f18a148c000 r-xp 00000000 08:02 402759180 /usr/lib64/libelf-0.172.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a148c000-7f18a168b000 ---p 00017000 08:02 402759180 /usr/lib64/libelf-0.172.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a168b000-7f18a168c000 r--p 00016000 08:02 402759180 /usr/lib64/libelf-0.172.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a168c000-7f18a168d000 rw-p 00017000 08:02 402759180 /usr/lib64/libelf-0.172.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a168d000-7f18a1691000 r-xp 00000000 08:02 402687657 /usr/lib64/libattr.so.1.1.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1691000-7f18a1890000 ---p 00004000 08:02 402687657 /usr/lib64/libattr.so.1.1.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1890000-7f18a1891000 r--p 00003000 08:02 402687657 /usr/lib64/libattr.so.1.1.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1891000-7f18a1892000 rw-p 00004000 08:02 402687657 /usr/lib64/libattr.so.1.1.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1892000-7f18a1894000 r-xp 00000000 08:02 402660474 /usr/lib64/libfreebl3.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1894000-7f18a1a93000 ---p 00002000 08:02 402660474 /usr/lib64/libfreebl3.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1a93000-7f18a1a94000 r--p 00001000 08:02 402660474 /usr/lib64/libfreebl3.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1a94000-7f18a1a95000 rw-p 00002000 08:02 402660474 /usr/lib64/libfreebl3.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1a95000-7f18a1a99000 r-xp 00000000 08:02 404318661 /usr/lib64/libuuid.so.1.3.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1a99000-7f18a1c98000 ---p 00004000 08:02 404318661 /usr/lib64/libuuid.so.1.3.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1c98000-7f18a1c99000 r--p 00003000 08:02 404318661 /usr/lib64/libuuid.so.1.3.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1c99000-7f18a1c9a000 rw-p 00004000 08:02 404318661 /usr/lib64/libuuid.so.1.3.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1c9a000-7f18a1cd6000 r-xp 00000000 08:02 404363268 /usr/lib64/libblkid.so.1.1.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1cd6000-7f18a1ed5000 ---p 0003c000 08:02 404363268 /usr/lib64/libblkid.so.1.1.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1ed5000-7f18a1ed8000 r--p 0003b000 08:02 404363268 /usr/lib64/libblkid.so.1.1.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1ed8000-7f18a1ed9000 rw-p 0003e000 08:02 404363268 /usr/lib64/libblkid.so.1.1.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1ed9000-7f18a1eda000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1eda000-7f18a1f26000 r-xp 00000000 08:02 402654656 /usr/lib64/libdw-0.172.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a1f26000-7f18a2126000 ---p 0004c000 08:02 402654656 /usr/lib64/libdw-0.172.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a2126000-7f18a2128000 r--p 0004c000 08:02 402654656 /usr/lib64/libdw-0.172.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a2128000-7f18a2129000 rw-p 0004e000 08:02 402654656 /usr/lib64/libdw-0.172.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a2129000-7f18a212d000 r-xp 00000000 08:02 402825383 /usr/lib64/libgpg-error.so.0.10.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a212d000-7f18a232c000 ---p 00004000 08:02 402825383 /usr/lib64/libgpg-error.so.0.10.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a232c000-7f18a232d000 r--p 00003000 08:02 402825383 /usr/lib64/libgpg-error.so.0.10.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a232d000-7f18a232e000 rw-p 00004000 08:02 402825383 /usr/lib64/libgpg-error.so.0.10.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a232e000-7f18a23ab000 r-xp 00000000 08:02 402758938 /usr/lib64/libgcrypt.so.11.8.2 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a23ab000-7f18a25aa000 ---p 0007d000 08:02 402758938 /usr/lib64/libgcrypt.so.11.8.2 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a25aa000-7f18a25ab000 r--p 0007c000 08:02 402758938 /usr/lib64/libgcrypt.so.11.8.2 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a25ab000-7f18a25ae000 rw-p 0007d000 08:02 402758938 /usr/lib64/libgcrypt.so.11.8.2 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a25ae000-7f18a25af000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a25af000-7f18a25c3000 r-xp 00000000 08:02 402659900 /usr/lib64/liblz4.so.1.7.5 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a25c3000-7f18a27c2000 ---p 00014000 08:02 402659900 /usr/lib64/liblz4.so.1.7.5 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a27c2000-7f18a27c3000 r--p 00013000 08:02 402659900 /usr/lib64/liblz4.so.1.7.5 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a27c3000-7f18a27c4000 rw-p 00014000 08:02 402659900 /usr/lib64/liblz4.so.1.7.5 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a27c4000-7f18a27e9000 r-xp 00000000 08:02 404286709 /usr/lib64/liblzma.so.5.2.2 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a27e9000-7f18a29e8000 ---p 00025000 08:02 404286709 /usr/lib64/liblzma.so.5.2.2 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a29e8000-7f18a29e9000 r--p 00024000 08:02 404286709 /usr/lib64/liblzma.so.5.2.2 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a29e9000-7f18a29ea000 rw-p 00025000 08:02 404286709 /usr/lib64/liblzma.so.5.2.2 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a29ea000-7f18a29f1000 r-xp 00000000 08:02 404810226 /usr/lib64/librt-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a29f1000-7f18a2bf0000 ---p 00007000 08:02 404810226 /usr/lib64/librt-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a2bf0000-7f18a2bf1000 r--p 00006000 08:02 404810226 /usr/lib64/librt-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a2bf1000-7f18a2bf2000 rw-p 00007000 08:02 404810226 /usr/lib64/librt-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a2bf2000-7f18a2cf3000 r-xp 00000000 08:02 404810209 /usr/lib64/libm-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a2cf3000-7f18a2ef2000 ---p 00101000 08:02 404810209 /usr/lib64/libm-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a2ef2000-7f18a2ef3000 r--p 00100000 08:02 404810209 /usr/lib64/libm-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a2ef3000-7f18a2ef4000 rw-p 00101000 08:02 404810209 /usr/lib64/libm-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a2ef4000-7f18a2ef8000 r-xp 00000000 08:02 402713865 /usr/lib64/libcap.so.2.22 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a2ef8000-7f18a30f7000 ---p 00004000 08:02 402713865 /usr/lib64/libcap.so.2.22 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a30f7000-7f18a30f8000 r--p 00003000 08:02 402713865 /usr/lib64/libcap.so.2.22 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a30f8000-7f18a30f9000 rw-p 00004000 08:02 402713865 /usr/lib64/libcap.so.2.22 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a30f9000-7f18a3101000 r-xp 00000000 08:02 404230255 /usr/lib64/libcrypt-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3101000-7f18a3300000 ---p 00008000 08:02 404230255 /usr/lib64/libcrypt-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3300000-7f18a3301000 r--p 00007000 08:02 404230255 /usr/lib64/libcrypt-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3301000-7f18a3302000 rw-p 00008000 08:02 404230255 /usr/lib64/libcrypt-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3302000-7f18a3330000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3330000-7f18a3345000 r-xp 00000000 08:02 404614628 /usr/lib64/libgcc_s-4.8.5-20150702.so.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3345000-7f18a3544000 ---p 00015000 08:02 404614628 /usr/lib64/libgcc_s-4.8.5-20150702.so.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3544000-7f18a3545000 r--p 00014000 08:02 404614628 /usr/lib64/libgcc_s-4.8.5-20150702.so.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3545000-7f18a3546000 rw-p 00015000 08:02 404614628 /usr/lib64/libgcc_s-4.8.5-20150702.so.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3546000-7f18a3586000 r-xp 00000000 08:02 404934324 /usr/lib64/libmount.so.1.1.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3586000-7f18a3786000 ---p 00040000 08:02 404934324 /usr/lib64/libmount.so.1.1.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3786000-7f18a3787000 r--p 00040000 08:02 404934324 /usr/lib64/libmount.so.1.1.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3787000-7f18a3788000 rw-p 00041000 08:02 404934324 /usr/lib64/libmount.so.1.1.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3788000-7f18a3789000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3789000-7f18a379f000 r-xp 00000000 08:02 404810224 /usr/lib64/libresolv-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a379f000-7f18a399e000 ---p 00016000 08:02 404810224 /usr/lib64/libresolv-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a399e000-7f18a399f000 r--p 00015000 08:02 404810224 /usr/lib64/libresolv-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a399f000-7f18a39a0000 rw-p 00016000 08:02 404810224 /usr/lib64/libresolv-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a39a0000-7f18a39a2000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a39a2000-7f18a39c6000 r-xp 00000000 08:02 404810237 /usr/lib64/libselinux.so.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a39c6000-7f18a3bc5000 ---p 00024000 08:02 404810237 /usr/lib64/libselinux.so.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3bc5000-7f18a3bc6000 r--p 00023000 08:02 404810237 /usr/lib64/libselinux.so.1 >Jul 05 09:14:42 m72e abrt-hook-ccpp[7974]: Process 3984 (gdm) of user 0 killed by SIGABRT - dumping core >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3bc6000-7f18a3bc7000 rw-p 00024000 08:02 404810237 /usr/lib64/libselinux.so.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3bc7000-7f18a3bc9000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3bc9000-7f18a3bde000 r-xp 00000000 08:02 402666844 /usr/lib64/libz.so.1.2.7 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3bde000-7f18a3ddd000 ---p 00015000 08:02 402666844 /usr/lib64/libz.so.1.2.7 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3ddd000-7f18a3dde000 r--p 00014000 08:02 402666844 /usr/lib64/libz.so.1.2.7 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3dde000-7f18a3ddf000 rw-p 00015000 08:02 402666844 /usr/lib64/libz.so.1.2.7 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3ddf000-7f18a3e3f000 r-xp 00000000 08:02 402659796 /usr/lib64/libpcre.so.1.2.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a3e3f000-7f18a403f000 ---p 00060000 08:02 402659796 /usr/lib64/libpcre.so.1.2.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a403f000-7f18a4040000 r--p 00060000 08:02 402659796 /usr/lib64/libpcre.so.1.2.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4040000-7f18a4041000 rw-p 00061000 08:02 402659796 /usr/lib64/libpcre.so.1.2.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4041000-7f18a4043000 r-xp 00000000 08:02 404320734 /usr/lib64/libdl-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4043000-7f18a4243000 ---p 00002000 08:02 404320734 /usr/lib64/libdl-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4243000-7f18a4244000 r--p 00002000 08:02 404320734 /usr/lib64/libdl-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4244000-7f18a4245000 rw-p 00003000 08:02 404320734 /usr/lib64/libdl-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4245000-7f18a4248000 r-xp 00000000 08:02 404999367 /usr/lib64/libgmodule-2.0.so.0.5600.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4248000-7f18a4447000 ---p 00003000 08:02 404999367 /usr/lib64/libgmodule-2.0.so.0.5600.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4447000-7f18a4448000 r--p 00002000 08:02 404999367 /usr/lib64/libgmodule-2.0.so.0.5600.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4448000-7f18a4449000 rw-p 00003000 08:02 404999367 /usr/lib64/libgmodule-2.0.so.0.5600.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4449000-7f18a4450000 r-xp 00000000 08:02 403056696 /usr/lib64/libffi.so.6.0.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4450000-7f18a464f000 ---p 00007000 08:02 403056696 /usr/lib64/libffi.so.6.0.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a464f000-7f18a4650000 r--p 00006000 08:02 403056696 /usr/lib64/libffi.so.6.0.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4650000-7f18a4651000 rw-p 00007000 08:02 403056696 /usr/lib64/libffi.so.6.0.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4651000-7f18a4813000 r-xp 00000000 08:02 402655539 /usr/lib64/libc-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4813000-7f18a4a13000 ---p 001c2000 08:02 402655539 /usr/lib64/libc-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4a13000-7f18a4a17000 r--p 001c2000 08:02 402655539 /usr/lib64/libc-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4a17000-7f18a4a19000 rw-p 001c6000 08:02 402655539 /usr/lib64/libc-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4a19000-7f18a4a1e000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4a1e000-7f18a4a35000 r-xp 00000000 08:02 402660476 /usr/lib64/libpthread-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4a35000-7f18a4c34000 ---p 00017000 08:02 402660476 /usr/lib64/libpthread-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4c34000-7f18a4c35000 r--p 00016000 08:02 402660476 /usr/lib64/libpthread-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4c35000-7f18a4c36000 rw-p 00017000 08:02 402660476 /usr/lib64/libpthread-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4c36000-7f18a4c3a000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4c3a000-7f18a4c69000 r-xp 00000000 08:02 402881184 /usr/lib64/libsystemd.so.0.6.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4c69000-7f18a4e69000 ---p 0002f000 08:02 402881184 /usr/lib64/libsystemd.so.0.6.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4e69000-7f18a4e6a000 r--p 0002f000 08:02 402881184 /usr/lib64/libsystemd.so.0.6.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4e6a000-7f18a4e6b000 rw-p 00030000 08:02 402881184 /usr/lib64/libsystemd.so.0.6.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4e6b000-7f18a4e70000 r-xp 00000000 08:02 403081243 /usr/lib64/libXdmcp.so.6.0.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a4e70000-7f18a506f000 ---p 00005000 08:02 403081243 /usr/lib64/libXdmcp.so.6.0.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a506f000-7f18a5070000 r--p 00004000 08:02 403081243 /usr/lib64/libXdmcp.so.6.0.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5070000-7f18a5071000 rw-p 00005000 08:02 403081243 /usr/lib64/libXdmcp.so.6.0.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5071000-7f18a5098000 r-xp 00000000 08:02 403086645 /usr/lib64/libxcb.so.1.1.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5098000-7f18a5297000 ---p 00027000 08:02 403086645 /usr/lib64/libxcb.so.1.1.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5297000-7f18a5298000 r--p 00026000 08:02 403086645 /usr/lib64/libxcb.so.1.1.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5298000-7f18a5299000 rw-p 00027000 08:02 403086645 /usr/lib64/libxcb.so.1.1.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5299000-7f18a52db000 r-xp 00000000 08:02 402985038 /usr/lib64/libaccountsservice.so.0.0.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a52db000-7f18a54db000 ---p 00042000 08:02 402985038 /usr/lib64/libaccountsservice.so.0.0.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a54db000-7f18a54e1000 r--p 00042000 08:02 402985038 /usr/lib64/libaccountsservice.so.0.0.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a54e1000-7f18a54e2000 rw-p 00048000 08:02 402985038 /usr/lib64/libaccountsservice.so.0.0.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a54e2000-7f18a55f6000 r-xp 00000000 08:02 404973051 /usr/lib64/libglib-2.0.so.0.5600.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a55f6000-7f18a57f5000 ---p 00114000 08:02 404973051 /usr/lib64/libglib-2.0.so.0.5600.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a57f5000-7f18a57f6000 r--p 00113000 08:02 404973051 /usr/lib64/libglib-2.0.so.0.5600.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a57f6000-7f18a57f7000 rw-p 00114000 08:02 404973051 /usr/lib64/libglib-2.0.so.0.5600.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a57f7000-7f18a57f8000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a57f8000-7f18a5847000 r-xp 00000000 08:02 404999386 /usr/lib64/libgobject-2.0.so.0.5600.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5847000-7f18a5a46000 ---p 0004f000 08:02 404999386 /usr/lib64/libgobject-2.0.so.0.5600.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5a46000-7f18a5a47000 r--p 0004e000 08:02 404999386 /usr/lib64/libgobject-2.0.so.0.5600.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5a47000-7f18a5a48000 rw-p 0004f000 08:02 404999386 /usr/lib64/libgobject-2.0.so.0.5600.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5a48000-7f18a5bdd000 r-xp 00000000 08:02 404784178 /usr/lib64/libgio-2.0.so.0.5600.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5bdd000-7f18a5ddd000 ---p 00195000 08:02 404784178 /usr/lib64/libgio-2.0.so.0.5600.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5ddd000-7f18a5de2000 r--p 00195000 08:02 404784178 /usr/lib64/libgio-2.0.so.0.5600.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5de2000-7f18a5de5000 rw-p 0019a000 08:02 404784178 /usr/lib64/libgio-2.0.so.0.5600.1 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5de5000-7f18a5de7000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5de7000-7f18a5de9000 r-xp 00000000 08:02 403081236 /usr/lib64/libXau.so.6.0.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5de9000-7f18a5fe9000 ---p 00002000 08:02 403081236 /usr/lib64/libXau.so.6.0.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5fe9000-7f18a5fea000 r--p 00002000 08:02 403081236 /usr/lib64/libXau.so.6.0.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5fea000-7f18a5feb000 rw-p 00003000 08:02 403081236 /usr/lib64/libXau.so.6.0.0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a5feb000-7f18a600d000 r-xp 00000000 08:02 402660745 /usr/lib64/ld-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a61d9000-7f18a61ea000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a6208000-7f18a620c000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7f18a620c000-7f18a620d000 r--p 00021000 08:02 402660745 /usr/lib64/ld-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a620d000-7f18a620e000 rw-p 00022000 08:02 402660745 /usr/lib64/ld-2.17.so >Jul 05 09:14:42 m72e gdm[3984]: 7f18a620e000-7f18a620f000 rw-p 00000000 00:00 0 >Jul 05 09:14:42 m72e gdm[3984]: 7fff931be000-7fff931df000 rw-p 00000000 00:00 0 [stack] >Jul 05 09:14:42 m72e gdm[3984]: 7fff931eb000-7fff931ed000 r-xp 00000000 00:00 0 [vdso] >Jul 05 09:14:42 m72e gdm[3984]: ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall] >Jul 05 09:14:43 m72e dbus[753]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Jul 05 09:14:43 m72e gnome-shell[4516]: JS ERROR: Failed to open reauthentication channel: Gio.DBusError: GDBus.Error:org.freedesktop.DBus.Error.NoReply: Message recipient disconnected from message bus without replying > _reauthenticationChannelOpened@resource:///org/gnome/shell/gdm/util.js:363:34 > wrapper@resource:///org/gnome/gjs/modules/_legacy.js:82:22 >Jul 05 09:14:43 m72e systemd[1]: gdm.service: main process exited, code=dumped, status=6/ABRT >Jul 05 09:14:43 m72e abrt-server[7977]: Duplicate: core backtrace >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.Keyboard.desktop' exited with code 1 >Jul 05 09:14:43 m72e abrt-server[7977]: DUP_OF_DIR: /var/spool/abrt/ccpp-2018-07-03-07:58:18-1313 >Jul 05 09:14:43 m72e thunderbird.desktop[4959]: thunderbird: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 09:14:43 m72e sealertauto.desktop[5512]: seapplet: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 09:14:43 m72e org.a11y.atspi.Registry[4484]: XIO: fatal IO error 11 (Resource temporarily unavailable) on X server ":0" >Jul 05 09:14:43 m72e org.a11y.atspi.Registry[4484]: after 4329 requests (4329 known processed) with 0 events remaining. >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.Keyboard.desktop' exited with code 1 >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.Wacom.desktop' exited with code 1 >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.Clipboard.desktop' exited with code 1 >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.Power.desktop' exited with code 1 >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.MediaKeys.desktop' exited with code 1 >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.XSettings.desktop' exited with code 1 >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.Color.desktop' exited with code 1 >Jul 05 09:14:43 m72e kernel: rfkill: input handler enabled >Jul 05 09:14:43 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: terminator: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.Wacom.desktop' exited with code 1 >Jul 05 09:14:43 m72e unknown[4681]: gsd-wacom: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 09:14:43 m72e org.gtk.vfs.Daemon[4298]: A connection to the bus can't be made >Jul 05 09:14:43 m72e org.gnome.Shell.CalendarServer[4298]: gnome-shell-calendar-server[4568]: Lost (or failed to acquire) the name org.gnome.Shell.CalendarServer - exiting >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 09:14:43 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[4713]: terminator: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.Clipboard.desktop' exited with code 1 >Jul 05 09:14:43 m72e unknown[4701]: gsd-clipboard: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.Power.desktop' exited with code 1 >Jul 05 09:14:43 m72e gnome-shell[4516]: gnome-shell: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.MediaKeys.desktop' exited with code 1 >Jul 05 09:14:43 m72e unknown[4709]: gsd-keyboard: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.XSettings.desktop' exited with code 1 >Jul 05 09:14:43 m72e unknown[5515]: abrt: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.Color.desktop' exited with code 1 >Jul 05 09:14:43 m72e unknown[4670]: gsd-xsettings: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 09:14:43 m72e unknown[4704]: gsd-color: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 09:14:43 m72e unknown[4654]: gsd-power: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 09:14:43 m72e unknown[4713]: gsd-media-keys: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 09:14:43 m72e unknown[5525]: rhsm-icon: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 09:14:43 m72e unknown[5514]: evolution-alarm-notify: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 09:14:43 m72e abrt-server[7977]: Deleting problem directory ccpp-2018-07-05-09:14:42-3984 (dup of ccpp-2018-07-03-07:58:18-1313) >Jul 05 09:14:43 m72e systemd[1]: Unit gdm.service entered failed state. >Jul 05 09:14:43 m72e systemd[1]: Triggering OnFailure= dependencies of gdm.service. >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.PrintNotifications.desktop' killed by signal 15 >Jul 05 09:14:43 m72e systemd[1]: gdm.service failed. >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.PrintNotifications.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Rfkill.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.ScreensaverProxy.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Rfkill.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Sharing.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Smartcard.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.Keyboard.desktop' exited with code 1 >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Sound.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.ScreensaverProxy.desktop' killed by signal 15 >Jul 05 09:14:43 m72e org.gnome.SettingsDaemon.Keyboard.desktop[7984]: Cannot open display: >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Sharing.desktop' killed by signal 15 >Jul 05 09:14:43 m72e unknown[7987]: Cannot open display: >Jul 05 09:14:43 m72e org.gtk.vfs.Daemon[4298]: A connection to the bus can't be made >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Datetime.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Housekeeping.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gnome-session[4288]: gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Smartcard.desktop' killed by signal 15 >Jul 05 09:14:43 m72e systemd[1]: Starting Terminate Plymouth Boot Screen... >Jul 05 09:14:43 m72e org.gtk.vfs.Daemon[4298]: A connection to the bus can't be made >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: App 'org.gnome.SettingsDaemon.Keyboard.desktop' exited with code 1 >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Sound.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' killed by signal 15 >Jul 05 09:14:43 m72e polkitd[771]: Unregistered Authentication Agent for unix-session:5 (system bus name :1.163, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) (disconnected from bus) >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Datetime.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Housekeeping.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gnome-session-binary[4288]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 09:14:43 m72e gdm-password][4262]: pam_unix(gdm-password:session): session closed for user whot >Jul 05 09:14:43 m72e systemd[1]: Started Terminate Plymouth Boot Screen. >Jul 05 09:14:43 m72e systemd[1]: gdm.service holdoff time over, scheduling restart. >Jul 05 09:14:43 m72e systemd[1]: Stopped GNOME Display Manager. >Jul 05 09:14:43 m72e systemd[1]: Starting GNOME Display Manager... >Jul 05 09:14:43 m72e kernel: Chrome_~dThread[7654]: segfault at 0 ip 00007f42ee331c08 sp 00007f42ecbaeae0 error 6 in libxul.so[7f42ee044000+4c74000] >Jul 05 09:14:43 m72e kernel: Chrome_~dThread[5813]: segfault at 0 ip 00007f6e37931c08 sp 00007f6e361aeae0 error 6 in libxul.so[7f6e37644000+4c74000] >Jul 05 09:14:43 m72e abrt-hook-ccpp[8002]: Process 5810 (firefox) of user 13349 killed by SIGSEGV - dumping core >Jul 05 09:14:43 m72e abrt-hook-ccpp[8001]: Process 7651 (firefox) of user 13349 killed by SIGSEGV - ignoring (repeated crash) >Jul 05 09:14:43 m72e systemd[1]: Started GNOME Display Manager. >Jul 05 09:14:43 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 09:14:43 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 09:14:43 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 09:14:43 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 09:14:43 m72e abrt-server[7977]: Email address of sender was not specified. Would you like to do so now? If not, 'user@localhost' is to be used [y/N] >Jul 05 09:14:43 m72e abrt-server[7977]: Email address of receiver was not specified. Would you like to do so now? If not, 'root@localhost' is to be used [y/N] >Jul 05 09:14:43 m72e abrt-server[7977]: Sending an email... >Jul 05 09:14:43 m72e abrt-server[7977]: Sending a notification email to: root@localhost >Jul 05 09:14:43 m72e postfix/sendmail[8016]: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 09:14:43 m72e postfix/sendmail[8016]: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 09:14:43 m72e abrt-server[7977]: send-mail: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 09:14:43 m72e abrt-server[7977]: send-mail: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 09:14:43 m72e abrt-server[7977]: Error running '/bin/mailx' >Jul 05 09:14:43 m72e dbus[753]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Jul 05 09:14:44 m72e setroubleshoot[7976]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/sbin/gdm. For complete SELinux messages run: sealert -l a5294b69-64db-48f8-9f04-5919c22322c6 >Jul 05 09:14:44 m72e python[7976]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/sbin/gdm. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gdm file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 09:14:44 m72e systemd[1]: Created slice User Slice of gdm. >Jul 05 09:14:44 m72e systemd-logind[774]: New session c3 of user gdm. >Jul 05 09:14:44 m72e systemd[1]: Started Session c3 of user gdm. >Jul 05 09:14:44 m72e gdm-launch-environment][8036]: pam_unix(gdm-launch-environment:session): session opened for user gdm by whot(uid=0) >Jul 05 09:14:44 m72e setroubleshoot[7976]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/sbin/gdm. For complete SELinux messages run: sealert -l a5294b69-64db-48f8-9f04-5919c22322c6 >Jul 05 09:14:44 m72e python[7976]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/sbin/gdm. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gdm file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 09:14:44 m72e org.a11y.Bus[8047]: Activating service name='org.a11y.atspi.Registry' >Jul 05 09:14:44 m72e org.a11y.Bus[8047]: Successfully activated service 'org.a11y.atspi.Registry' >Jul 05 09:14:44 m72e org.a11y.atspi.Registry[8057]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry >Jul 05 09:14:44 m72e gnome-session[8041]: generating cookie with syscall >Jul 05 09:14:44 m72e gnome-session[8041]: generating cookie with syscall >Jul 05 09:14:44 m72e gnome-session[8041]: generating cookie with syscall >Jul 05 09:14:44 m72e gnome-session[8041]: generating cookie with syscall >Jul 05 09:14:44 m72e setroubleshoot[7976]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 09:14:44 m72e python[7976]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 09:14:44 m72e setroubleshoot[7976]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 09:14:44 m72e python[7976]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 09:14:44 m72e setroubleshoot[7976]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. For complete SELinux messages run: sealert -l c2670567-6ce1-42fd-bb01-7cdf552b3c40 >Jul 05 09:14:44 m72e python[7976]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that postdrop should be allowed map access on the postdrop file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'postdrop' --raw | audit2allow -M my-postdrop > # semodule -i my-postdrop.pp > >Jul 05 09:14:45 m72e rtkit-daemon[770]: Successfully made thread 8103 of process 8103 (/usr/bin/pulseaudio) owned by '42' high priority at nice level -11. >Jul 05 09:14:45 m72e rtkit-daemon[770]: Supervising 1 threads of 1 processes of 1 users. >Jul 05 09:14:45 m72e rtkit-daemon[770]: Supervising 1 threads of 1 processes of 1 users. >Jul 05 09:14:45 m72e rtkit-daemon[770]: Successfully made thread 8106 of process 8103 (/usr/bin/pulseaudio) owned by '42' RT at priority 5. >Jul 05 09:14:45 m72e rtkit-daemon[770]: Supervising 2 threads of 1 processes of 1 users. >Jul 05 09:14:45 m72e rtkit-daemon[770]: Supervising 2 threads of 1 processes of 1 users. >Jul 05 09:14:45 m72e rtkit-daemon[770]: Successfully made thread 8109 of process 8103 (/usr/bin/pulseaudio) owned by '42' RT at priority 5. >Jul 05 09:14:45 m72e rtkit-daemon[770]: Supervising 3 threads of 1 processes of 1 users. >Jul 05 09:14:45 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Jul 05 09:14:45 m72e systemd[1]: Starting Locale Service... >Jul 05 09:14:45 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.locale1' >Jul 05 09:14:45 m72e systemd[1]: Started Locale Service. >Jul 05 09:14:45 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' >Jul 05 09:14:45 m72e systemd[1]: Starting Location Lookup Service... >Jul 05 09:14:46 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.GeoClue2' >Jul 05 09:14:46 m72e systemd[1]: Started Location Lookup Service. >Jul 05 09:14:46 m72e polkitd[771]: Registered Authentication Agent for unix-session:c3 (system bus name :1.237 [/usr/bin/gnome-shell], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) >Jul 05 09:14:46 m72e spice-vdagent[8142]: Cannot access vdagent virtio channel /dev/virtio-ports/com.redhat.spice.0 >Jul 05 09:14:46 m72e gnome-session-binary[8041]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 09:14:46 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 09:14:46 m72e gsd-xsettings[8140]: Failed to get current display configuration state: GDBus.Error:org.freedesktop.DBus.Error.NameHasNoOwner: Name "org.gnome.Mutter.DisplayConfig" does not exist >Jul 05 09:14:46 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' >Jul 05 09:14:46 m72e gnome-shell[8083]: Failed to load background 'file:///usr/share/backgrounds/gnome/adwaita-lock.jpg': Error opening file /usr/share/backgrounds/gnome/adwaita-lock.jpg: No such file or directory >Jul 05 09:14:46 m72e gnome-session-binary[8041]: Entering running state >Jul 05 09:14:46 m72e gnome-shell[8083]: Some code accessed the property 'AuthList' on the module 'authList'. That property was defined with 'let' or 'const' inside the module. This was previously supported, but is not correct according to the ES6 standard. Any symbols to be exported from a module must be defined with 'var'. The property access will work as previously for the time being, but please fix your code anyway. >Jul 05 09:14:46 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.realmd' unit='realmd.service' >Jul 05 09:14:46 m72e gnome-shell[8083]: Error looking up permission: GDBus.Error:org.freedesktop.portal.Error.NotFound: No entry for geolocation >Jul 05 09:14:46 m72e gnome-shell[8083]: JS WARNING: [resource:///org/gnome/shell/ui/layout.js 29]: reference to undefined property "MetaWindowX11" >Jul 05 09:14:47 m72e systemd[1]: Starting Hostname Service... >Jul 05 09:14:47 m72e systemd[1]: Starting Realm and Domain Configuration... >Jul 05 09:14:47 m72e realmd[8246]: Loaded settings from: /usr/lib64/realmd/realmd-defaults.conf /usr/lib64/realmd/realmd-distro.conf >Jul 05 09:14:47 m72e realmd[8246]: holding daemon: startup >Jul 05 09:14:47 m72e realmd[8246]: starting service >Jul 05 09:14:47 m72e realmd[8246]: connected to bus >Jul 05 09:14:47 m72e realmd[8246]: released daemon: startup >Jul 05 09:14:47 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.realmd' >Jul 05 09:14:47 m72e systemd[1]: Started Realm and Domain Configuration. >Jul 05 09:14:47 m72e realmd[8246]: claimed name on bus: org.freedesktop.realmd >Jul 05 09:14:47 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.hostname1' >Jul 05 09:14:47 m72e systemd[1]: Started Hostname Service. >Jul 05 09:14:47 m72e org.gnome.Shell.desktop[8083]: Window manager warning: "XF86RFKill" is not a valid accelerator >Jul 05 09:14:47 m72e abrt-hook-ccpp[8002]: Failed to create core_backtrace: waitpid failed: No child processes >Jul 05 09:14:47 m72e setroubleshoot[7976]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. For complete SELinux messages run: sealert -l 878583e9-e1dd-462e-a486-e30159ea9944 >Jul 05 09:14:47 m72e python[7976]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that gnome-shell should be allowed map access on the hwdb.bin file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell > # semodule -i my-gnomeshell.pp > >Jul 05 09:14:47 m72e abrt-server[8279]: Executable '/home/whot/firefox/firefox' doesn't belong to any package and ProcessUnpackaged is set to 'no' >Jul 05 09:14:47 m72e abrt-server[8279]: 'post-create' on '/var/spool/abrt/ccpp-2018-07-05-09:14:43-5810' exited with 1 >Jul 05 09:14:47 m72e abrt-server[8279]: Deleting problem directory '/var/spool/abrt/ccpp-2018-07-05-09:14:43-5810' >Jul 05 09:14:47 m72e setroubleshoot[7976]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. For complete SELinux messages run: sealert -l 878583e9-e1dd-462e-a486-e30159ea9944 >Jul 05 09:14:47 m72e python[7976]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that gnome-shell should be allowed map access on the hwdb.bin file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell > # semodule -i my-gnomeshell.pp > >Jul 05 09:14:47 m72e setroubleshoot[7976]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. For complete SELinux messages run: sealert -l 878583e9-e1dd-462e-a486-e30159ea9944 >Jul 05 09:14:47 m72e python[7976]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that gnome-shell should be allowed map access on the hwdb.bin file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell > # semodule -i my-gnomeshell.pp > >Jul 05 09:14:50 m72e systemd-logind[774]: New session 14 of user whot. >Jul 05 09:14:50 m72e systemd[1]: Started Session 14 of user whot. >Jul 05 09:14:50 m72e gdm-password][8290]: pam_unix(gdm-password:session): session opened for user whot by whot(uid=0) >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.MediaKeys.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.PrintNotifications.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Rfkill.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.ScreensaverProxy.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Sharing.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Smartcard.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Sound.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.MediaKeys.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.PrintNotifications.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.XSettings.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Rfkill.desktop' killed by signal 15 >Jul 05 09:14:53 m72e at-spi2-registr[8062]: Failed to send session response The connection is closed >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.ScreensaverProxy.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Sharing.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Smartcard.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Sound.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.XSettings.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Clipboard.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Color.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Datetime.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Housekeeping.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Keyboard.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Power.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Wacom.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Clipboard.desktop' killed by signal 15 >Jul 05 09:14:53 m72e unknown[8253]: Error releasing name org.freedesktop.portal.IBus: The connection is closed >Jul 05 09:14:53 m72e gnome-session[8041]: gnome-session-binary[8041]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Color.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Datetime.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Housekeeping.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Keyboard.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Power.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Application 'org.gnome.SettingsDaemon.Wacom.desktop' killed by signal 15 >Jul 05 09:14:53 m72e gnome-session-binary[8041]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 09:14:53 m72e polkitd[771]: Unregistered Authentication Agent for unix-session:c3 (system bus name :1.237, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) (disconnected from bus) >Jul 05 09:14:53 m72e gnome-session-f[8324]: Cannot open display: >Jul 05 09:14:53 m72e gdm-password][8326]: unable to log session >Jul 05 09:14:53 m72e com.redhat.imsettings[8337]: [ 1530746093.612949]: IMSettings-Daemon[8406]: INFO: Starting imsettings-daemon... >Jul 05 09:14:53 m72e com.redhat.imsettings[8337]: [ 1530746093.613091]: IMSettings-Daemon[8406]: INFO: [HOME=/home/whot/.config/imsettings] >Jul 05 09:14:53 m72e com.redhat.imsettings[8337]: [ 1530746093.613132]: IMSettings-Daemon[8406]: INFO: [XINPUTRCDIR=/etc/X11/xinit/] >Jul 05 09:14:53 m72e com.redhat.imsettings[8337]: [ 1530746093.613168]: IMSettings-Daemon[8406]: INFO: [XINPUTDIR=/etc/X11/xinit/xinput.d/] >Jul 05 09:14:53 m72e com.redhat.imsettings[8337]: [ 1530746093.613203]: IMSettings-Daemon[8406]: INFO: [MODULEDIR=/usr/lib64/imsettings] >Jul 05 09:14:53 m72e com.redhat.imsettings[8337]: [ 1530746093.613241]: IMSettings-Daemon[8406]: INFO: [MODULES=gsettings, qt] >Jul 05 09:14:53 m72e org.a11y.Bus[8337]: Activating service name='org.a11y.atspi.Registry' >Jul 05 09:14:53 m72e org.a11y.Bus[8337]: Successfully activated service 'org.a11y.atspi.Registry' >Jul 05 09:14:53 m72e org.a11y.atspi.Registry[8525]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry >Jul 05 09:14:53 m72e gnome-session[8326]: generating cookie with syscall >Jul 05 09:14:53 m72e gnome-session[8326]: generating cookie with syscall >Jul 05 09:14:53 m72e gnome-session[8326]: generating cookie with syscall >Jul 05 09:14:53 m72e gnome-session[8326]: generating cookie with syscall >Jul 05 09:14:53 m72e gnome-keyring-daemon[8307]: Gkm: using old keyring directory: /home/whot/.gnome2/keyrings >Jul 05 09:14:53 m72e gnome-keyring-daemon[8307]: Gkm: using old keyring directory: /home/whot/.gnome2/keyrings >Jul 05 09:14:53 m72e gnome-keyring-ssh.desktop[8551]: SSH_AUTH_SOCK=/run/user/13349/keyring/ssh >Jul 05 09:14:53 m72e setroubleshoot[7976]: SELinux is preventing /usr/libexec/gdm-session-worker from 'read, append' accesses on the file session.log. For complete SELinux messages run: sealert -l 508ab26c-ffb6-4759-84e1-90e0199490bb >Jul 05 09:14:53 m72e python[7976]: SELinux is preventing /usr/libexec/gdm-session-worker from 'read, append' accesses on the file session.log. > > ***** Plugin catchall_labels (83.8 confidence) suggests ******************* > > If you want to allow gdm-session-worker to have read append access on the session.log file > Then you need to change the label on session.log > Do > # semanage fcontext -a -t FILE_TYPE 'session.log' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, admin_crontab_tmp_t, alsa_tmp_t, amanda_tmp_t, anon_inodefs_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, auditadm_sudo_tmp_t, auth_cache_t, auth_home_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cgroup_t, chrome_sandbox_tmp_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_tmp_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_tmp_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_runtime_tmp_t, couchdb_tmp_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_lpd_tmp_t, cupsd_tmp_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, etc_runtime_t, exim_tmp_t, fail2ban_tmp_t, faillog_t, fenced_tmp_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, initrc_var_run_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, iscsi_tmp_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, lastlog_t, ldconfig_tmp_t, livecd_tmp_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_tmp_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, netutils_tmp_t, neutron_tmp_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, pam_var_console_t, pam_var_run_t, passenger_tmp_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_tmp_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_tmp_t, prelude_lml_tmp_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rsync_tmp_t, rtas_errd_tmp_t, samba_net_tmp_t, sbd_tmpfs_t, sblim_tmp_t, secadm_sudo_tmp_t, sectool_tmp_t, security_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, ssh_agent_tmp_t, ssh_keygen_tmp_t, ssh_tmpfs_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_cronjob_tmp_t, system_dbusd_tmp_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_passwd_var_run_t, targetd_tmp_t, tcpd_tmp_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_tmp_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, tgtd_tmp_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, user_cron_spool_t, user_fonts_t, user_mail_tmp_t, user_tmp_t, uucpd_tmp_t, var_auth_t, var_spool_t, varnishd_tmp_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmtools_tmp_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wireshark_tmp_t, wireshark_tmpfs_t, wtmp_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_lock_t, xdm_log_t, xdm_rw_etc_t, xdm_spool_t, xdm_tmpfs_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenstored_tmp_t, xkb_var_lib_t, xserver_log_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t. > Then execute: > restorecon -v 'session.log' > > > ***** Plugin catchall (17.1 confidence) suggests ************************** > > If you believe that gdm-session-worker should be allowed read append access on the session.log file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdm-session-wor' --raw | audit2allow -M my-gdmsessionwor > # semodule -i my-gdmsessionwor.pp > >Jul 05 09:14:54 m72e rtkit-daemon[770]: Successfully made thread 8568 of process 8568 (/usr/bin/pulseaudio) owned by '13349' high priority at nice level -11. >Jul 05 09:14:54 m72e rtkit-daemon[770]: Supervising 4 threads of 2 processes of 2 users. >Jul 05 09:14:54 m72e pulseaudio[8568]: [pulseaudio] pid.c: Stale PID file, overwriting. >Jul 05 09:14:54 m72e rtkit-daemon[770]: Supervising 4 threads of 2 processes of 2 users. >Jul 05 09:14:54 m72e rtkit-daemon[770]: Successfully made thread 8571 of process 8568 (/usr/bin/pulseaudio) owned by '13349' RT at priority 5. >Jul 05 09:14:54 m72e rtkit-daemon[770]: Supervising 5 threads of 2 processes of 2 users. >Jul 05 09:14:54 m72e rtkit-daemon[770]: Supervising 5 threads of 2 processes of 2 users. >Jul 05 09:14:54 m72e rtkit-daemon[770]: Successfully made thread 8574 of process 8568 (/usr/bin/pulseaudio) owned by '13349' RT at priority 5. >Jul 05 09:14:54 m72e rtkit-daemon[770]: Supervising 6 threads of 2 processes of 2 users. >Jul 05 09:14:54 m72e dbus[753]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' >Jul 05 09:14:55 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' >Jul 05 09:14:55 m72e systemd[1]: Starting Location Lookup Service... >Jul 05 09:14:55 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.GeoClue2' >Jul 05 09:14:55 m72e systemd[1]: Started Location Lookup Service. >Jul 05 09:14:55 m72e polkitd[771]: Registered Authentication Agent for unix-session:14 (system bus name :1.263 [/usr/bin/gnome-shell], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) >Jul 05 09:14:55 m72e goa-daemon[8642]: goa-daemon version 3.28.0 starting >Jul 05 09:14:55 m72e goa-identity-se[8664]: GoaKerberosIdentityManager: Using polling for change notification for credential cache type 'KEYRING' >Jul 05 09:14:55 m72e org.gtk.vfs.AfcVolumeMonitor[8337]: Volume monitor alive >Jul 05 09:14:56 m72e gnome-shell[8558]: Some code accessed the property '_modes' on the module 'sessionMode'. That property was defined with 'let' or 'const' inside the module. This was previously supported, but is not correct according to the ES6 standard. Any symbols to be exported from a module must be defined with 'var'. The property access will work as previously for the time being, but please fix your code anyway. >Jul 05 09:14:56 m72e spice-vdagent[8719]: Cannot access vdagent virtio channel /dev/virtio-ports/com.redhat.spice.0 >Jul 05 09:14:56 m72e setroubleshoot[7976]: SELinux is preventing /usr/libexec/gdm-session-worker from write access on the directory gdm. For complete SELinux messages run: sealert -l 62b4a3f6-9761-4f8f-9235-10f811608807 >Jul 05 09:14:56 m72e python[7976]: SELinux is preventing /usr/libexec/gdm-session-worker from write access on the directory gdm. > > ***** Plugin catchall_labels (83.8 confidence) suggests ******************* > > If you want to allow gdm-session-worker to have write access on the gdm directory > Then you need to change the label on gdm > Do > # semanage fcontext -a -t FILE_TYPE 'gdm' > where FILE_TYPE is one of the following: abrt_var_cache_t, admin_home_t, alsa_home_t, antivirus_home_t, audio_home_t, auth_cache_t, auth_home_t, cache_home_t, cgroup_t, chrome_sandbox_home_t, config_home_t, container_home_t, cvs_home_t, data_home_t, dbus_home_t, etc_t, faillog_t, fetchmail_home_t, fonts_cache_t, gconf_home_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, gnome_home_t, gpg_secret_t, gstreamer_home_t, home_bin_t, home_cert_t, httpd_user_content_t, httpd_user_script_exec_t, icc_data_home_t, iceauth_home_t, init_var_run_t, irc_home_t, irc_tmp_t, irssi_home_t, kismet_home_t, krb5_home_t, krb5_host_rcache_t, local_login_home_t, locale_t, mail_home_rw_t, mail_home_t, mandb_home_t, mozilla_home_t, mozilla_plugin_rw_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mpd_home_t, mpd_user_data_t, mplayer_home_t, mysqld_home_t, openshift_var_lib_t, pam_var_console_t, pam_var_run_t, polipo_cache_home_t, polipo_config_home_t, procmail_home_t, pulseaudio_home_t, rlogind_home_t, root_t, rssh_ro_t, rssh_rw_t, sandbox_file_t, screen_home_t, spamc_home_t, speech-dispatcher_home_t, ssh_home_t, svirt_home_t, systemd_home_t, systemd_passwd_var_run_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_sunshine_home_t, texlive_home_t, thumb_home_t, tmp_t, tmpfs_t, tvtime_home_t, uml_ro_t, uml_rw_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_dir_t, user_home_t, user_tmp_t, usr_t, var_auth_t, var_lib_t, var_lock_t, var_log_t, var_run_t, var_spool_t, var_t, virt_content_t, virt_home_t, vmware_conf_t, vmware_file_t, wine_home_t, wireshark_home_t, xauth_home_t, xdm_home_t, xdm_log_t, xdm_rw_etc_t, xdm_spool_t, xdm_tmpfs_t, xdm_var_lib_t, xdm_var_run_t, xkb_var_lib_t, xserver_log_t. > Then execute: > restorecon -v 'gdm' > > > ***** Plugin catchall (17.1 confidence) suggests ************************** > > If you believe that gdm-session-worker should be allowed write access on the gdm directory by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdm-session-wor' --raw | audit2allow -M my-gdmsessionwor > # semodule -i my-gdmsessionwor.pp > >Jul 05 09:14:56 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 09:14:56 m72e gnome-session-binary[8326]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 09:14:56 m72e kernel: traps: gsd-account[8691] trap int3 ip:7fa6e12e1b11 sp:7ffc3ae834a0 error:0 >Jul 05 09:14:56 m72e gsd-account[8691]: Settings schema 'org.gnome.settings-daemon.plugins.account' is not installed >Jul 05 09:14:56 m72e gsd-housekeepin[8742]: Loading NVML: libnvidia-ml.so: cannot open shared object file: No such file or directory >Jul 05 09:14:56 m72e kernel: rfkill: input handler disabled >Jul 05 09:14:56 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.NetworkManager' unit='dbus-org.freedesktop.NetworkManager.service' >Jul 05 09:14:56 m72e dbus[753]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.NetworkManager.service': Unit not found. >Jul 05 09:14:56 m72e gsd-rfkill[8697]: Failed to acquire NetworkManager proxy: Error calling StartServiceByName for org.freedesktop.NetworkManager: GDBus.Error:org.freedesktop.systemd1.NoSuchUnit: Unit not found. >Jul 05 09:14:56 m72e gsd-xsettings[8707]: Failed to get current display configuration state: GDBus.Error:org.freedesktop.DBus.Error.NameHasNoOwner: Name "org.gnome.Mutter.DisplayConfig" does not exist >Jul 05 09:14:56 m72e abrt-hook-ccpp[8762]: Process 8691 (gsd-account) of user 13349 killed by SIGTRAP - dumping core >Jul 05 09:14:56 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc: Permission denied >Jul 05 09:14:56 m72e gsd-color[8737]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc: Permission denied >Jul 05 09:14:56 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc: Permission denied >Jul 05 09:14:56 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc: Permission denied >Jul 05 09:14:56 m72e gsd-color[8737]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc: Permission denied >Jul 05 09:14:56 m72e gsd-color[8737]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc: Permission denied >Jul 05 09:14:56 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 09:14:56 m72e gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 09:14:56 m72e gsd-media-keys[8750]: g_variant_get_va: assertion 'value != NULL' failed >Jul 05 09:14:56 m72e gsd-media-keys[8750]: g_variant_unref: assertion 'value != NULL' failed >Jul 05 09:14:56 m72e gsd-account[8808]: Settings schema 'org.gnome.settings-daemon.plugins.account' is not installed >Jul 05 09:14:56 m72e kernel: traps: gsd-account[8808] trap int3 ip:7efce6787b11 sp:7ffec75f7120 error:0 >Jul 05 09:14:56 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc: Permission denied >Jul 05 09:14:56 m72e gsd-color[8737]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc: Permission denied >Jul 05 09:14:56 m72e abrt-hook-ccpp[8813]: Process 8808 (gsd-account) of user 13349 killed by SIGTRAP - ignoring (repeated crash) >Jul 05 09:14:56 m72e gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 09:14:56 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 09:14:56 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: App 'org.gnome.SettingsDaemon.Account.desktop' respawning too quickly >Jul 05 09:14:56 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: Error on restarting session managed app: Component 'org.gnome.SettingsDaemon.Account.desktop' crashing too quickly >Jul 05 09:14:56 m72e gnome-session-binary[8326]: WARNING: App 'org.gnome.SettingsDaemon.Account.desktop' respawning too quickly >Jul 05 09:14:56 m72e gnome-session-binary[8326]: WARNING: Error on restarting session managed app: Component 'org.gnome.SettingsDaemon.Account.desktop' crashing too quickly >Jul 05 09:14:56 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc: Permission denied >Jul 05 09:14:56 m72e gsd-color[8737]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc: Permission denied >Jul 05 09:14:56 m72e gnome-shell[8558]: JS WARNING: [resource:///org/gnome/shell/ui/workspaceThumbnail.js 887]: reference to undefined property "_switchWorkspaceNotifyId" >Jul 05 09:14:56 m72e abrt-server[8807]: Duplicate: core backtrace >Jul 05 09:14:56 m72e abrt-server[8807]: DUP_OF_DIR: /var/spool/abrt/ccpp-2018-07-02-09:55:59-10206 >Jul 05 09:14:56 m72e abrt-server[8807]: Deleting problem directory ccpp-2018-07-05-09:14:56-8691 (dup of ccpp-2018-07-02-09:55:59-10206) >Jul 05 09:14:56 m72e setroubleshoot[7976]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 09:14:56 m72e python[7976]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-0bac1383fb4abc86437df0bfd31023b9.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-0bac1383fb4abc86437df0bfd31023b9.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 09:14:56 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 09:14:56 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 09:14:56 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 09:14:56 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 09:14:56 m72e abrt-server[8807]: Email address of sender was not specified. Would you like to do so now? If not, 'user@localhost' is to be used [y/N] >Jul 05 09:14:56 m72e abrt-server[8807]: Email address of receiver was not specified. Would you like to do so now? If not, 'root@localhost' is to be used [y/N] >Jul 05 09:14:56 m72e abrt-server[8807]: Sending an email... >Jul 05 09:14:56 m72e abrt-server[8807]: Sending a notification email to: root@localhost >Jul 05 09:14:56 m72e abrt-server[8807]: send-mail: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 09:14:56 m72e postfix/sendmail[8832]: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 09:14:56 m72e postfix/sendmail[8832]: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 09:14:56 m72e abrt-server[8807]: send-mail: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 09:14:56 m72e abrt-server[8807]: Error running '/bin/mailx' >Jul 05 09:14:56 m72e setroubleshoot[7976]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 09:14:56 m72e python[7976]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-0c2d933e282feb5e95379b2caa320512.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-0c2d933e282feb5e95379b2caa320512.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 09:14:57 m72e gnome-shell[8558]: Failed to load background 'file:///usr/share/backgrounds/gnome/adwaita-lock.jpg': Error opening file /usr/share/backgrounds/gnome/adwaita-lock.jpg: No such file or directory >Jul 05 09:14:57 m72e setroubleshoot[7976]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 09:14:57 m72e python[7976]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-425bbe74e56050940c54b0f2931c5aec.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-425bbe74e56050940c54b0f2931c5aec.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 09:14:57 m72e setroubleshoot[7976]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 09:14:57 m72e python[7976]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-9d03684165204e087fc5b6a268ff58f2.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-9d03684165204e087fc5b6a268ff58f2.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 09:14:57 m72e gnome-shell[8558]: Error looking up permission: GDBus.Error:org.freedesktop.portal.Error.NotFound: No entry for geolocation >Jul 05 09:14:57 m72e setroubleshoot[7976]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 09:14:57 m72e python[7976]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 09:14:57 m72e setroubleshoot[7976]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. For complete SELinux messages run: sealert -l 6669b36f-d550-4692-840a-03526ca0d447 >Jul 05 09:14:57 m72e python[7976]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gsd-account file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 09:14:57 m72e org.gnome.Shell.desktop[8558]: Window manager warning: "XF86RFKill" is not a valid accelerator >Jul 05 09:14:57 m72e setroubleshoot[7976]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. For complete SELinux messages run: sealert -l 6669b36f-d550-4692-840a-03526ca0d447 >Jul 05 09:14:57 m72e python[7976]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gsd-account file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 09:14:58 m72e gnome-shell[8558]: GNOME Shell started at Thu Jul 05 2018 09:14:55 GMT+1000 (AEST) >Jul 05 09:15:00 m72e setroubleshoot[7976]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 09:15:00 m72e python[7976]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 09:15:00 m72e telepathy-haze[8665]: Exiting >Jul 05 09:15:01 m72e setroubleshoot[7976]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 09:15:01 m72e python[7976]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 09:15:01 m72e setroubleshoot[7976]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. For complete SELinux messages run: sealert -l c2670567-6ce1-42fd-bb01-7cdf552b3c40 >Jul 05 09:15:01 m72e python[7976]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that postdrop should be allowed map access on the postdrop file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'postdrop' --raw | audit2allow -M my-postdrop > # semodule -i my-postdrop.pp > >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112204 addons.xpi-utils WARN Could not find source bundle for add-on info@skymeissner.com: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112208 addons.xpi-utils WARN Could not find source bundle for add-on {5872365e-67d1-4afd-9480-fd293bebd20d}: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112210 addons.xpi-utils WARN Could not find source bundle for add-on lazarus@interclue.com: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112212 addons.xpi-utils WARN Could not find source bundle for add-on firebug@software.joehewitt.com: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112214 addons.xpi-utils WARN Could not find source bundle for add-on sendtokindle@amazon.com: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112216 addons.xpi-utils WARN Could not find source bundle for add-on {097d3191-e6fa-4728-9826-b533d755359d}: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112218 addons.xpi-utils WARN Could not find source bundle for add-on {2541D29A-DB9E-4c1e-949A-31EFB4AEF4E7}: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112220 addons.xpi-utils WARN Could not find source bundle for add-on adbhelper@mozilla.org: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112222 addons.xpi-utils WARN Could not find source bundle for add-on jid0-XWJxt5VvCXkKzQK99PhZqAn7Xbg@jetpack: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112224 addons.xpi-utils WARN Could not find source bundle for add-on jid1-MnnxcxisBPnSXQ-eff@jetpack: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112228 addons.xpi-utils WARN Could not find source bundle for add-on leechblockng@proginosko.com: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112230 addons.xpi-utils WARN Could not find source bundle for add-on openinbrowser@www.spasche.net: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112232 addons.xpi-utils WARN Could not find source bundle for add-on {73a6fe31-595d-460b-a920-fcc0f8843232}: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112232 addons.xpi-utils WARN Could not find source bundle for add-on https-everywhere@eff.org: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112234 addons.xpi-utils WARN Could not find source bundle for add-on {e968fc70-8f95-4ab9-9e79-304de2a71ee1}: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112236 addons.xpi-utils WARN Could not find source bundle for add-on {05e38d80-09c1-11dd-bd0b-0800200c9a66}: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112238 addons.xpi-utils WARN Could not find source bundle for add-on splitpannel@max.max: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112240 addons.xpi-utils WARN Could not find source bundle for add-on codeviewer@wannasoft.mysmth.net: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112242 addons.xpi-utils WARN Could not find source bundle for add-on feedly@devhd: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112244 addons.xpi-utils WARN Could not find source bundle for add-on savefileto@mozdev.org: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112246 addons.xpi-utils WARN Could not find source bundle for add-on {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112246 addons.xpi-utils WARN Could not find source bundle for add-on {888d99e7-e8b5-46a3-851e-1ec45da1e644}: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112248 addons.xpi-utils WARN Could not find source bundle for add-on {a95d8332-e4b4-6e7f-98ac-20b733364387}: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112250 addons.xpi-utils WARN Could not find source bundle for add-on {fe62bb60-d385-11e1-9b23-0800200c9a66}: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112252 addons.xpi-utils WARN Could not find source bundle for add-on fxdevtools-adapters@mozilla.org: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112254 addons.xpi-utils WARN Could not find source bundle for add-on aushelper@mozilla.org: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112254 addons.xpi-utils WARN Could not find source bundle for add-on firefox@getpocket.com: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112256 addons.xpi-utils WARN Could not find source bundle for add-on webcompat@mozilla.org: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112258 addons.xpi-utils WARN Could not find source bundle for add-on activity-stream@mozilla.org: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112260 addons.xpi-utils WARN Could not find source bundle for add-on followonsearch@mozilla.com: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112262 addons.xpi-utils WARN Could not find source bundle for add-on formautofill@mozilla.org: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112262 addons.xpi-utils WARN Could not find source bundle for add-on onboarding@mozilla.org: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112264 addons.xpi-utils WARN Could not find source bundle for add-on screenshots@mozilla.org: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112266 addons.xpi-utils WARN Could not find source bundle for add-on webcompat-reporter@mozilla.org: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112266 addons.xpi-utils WARN Could not find source bundle for add-on jid1-WiAigu4HIo0Tag@jetpack: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112268 addons.xpi-utils WARN Could not find source bundle for add-on uBlock0@raymondhill.net: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112270 addons.xpi-utils WARN Could not find source bundle for add-on firefox@ghostery.com: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112272 addons.xpi-utils WARN Could not find source bundle for add-on {5C46D283-ABDE-4dce-B83C-08881401921C}: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112272 addons.xpi-utils WARN Could not find source bundle for add-on support@lastpass.com: [Exception... "Component returned failure code: 0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH) [nsIFile.persistentDescriptor]" nsresult: "0x80520001 (NS_ERROR_FILE_UNRECOGNIZED_PATH)" location: "JS frame :: resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js :: this.XPIDatabase.parseDB :: line 673" data: no] Stack trace: this.XPIDatabase.parseDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:673 < this.XPIDatabase.syncLoadDB()@resource://gre/modules/addons/XPIProvider.jsm -> resource://gre/modules/addons/XPIProviderUtils.js:599 < this.XPIProvider.checkForChanges()@resource://gre/modules/addons/XPIProvider.jsm:3837 < this.XPIProvider.startup()@resource://gre/modules/addons/XPIProvider.jsm:2830 < callProvider()@resource://gre/modules/AddonManager.jsm:237 < _startProvider()@resource://gre/modules/AddonManager.jsm:790 < AddonManagerInternal.startup()@resource://gre/modules/AddonManager.jsm:976 < this.AddonManagerPrivate.startup()@resource://gre/modules/AddonManager.jsm:3033 < amManager.prototype.observe()@resource://gre/components/addonManager.js:65 >Jul 05 09:15:12 m72e firefox.desktop[8956]: 1530746112814 addons.xpi WARN Exception running bootstrap method startup on adbhelper@mozilla.org: Error: Module: Can not resolve "chrome" module required by ./main located at resource://adbhelperatmozilla.org/main.js (resource://adbhelperatmozilla.org/main.js:895) JS Stack trace: @main.js:9:16 < startup@jar:file:///home/whot/.mozilla/firefox/7d7utgxu.default/extensions/adbhelper@bootstrap.js:123:16 < this.XPIProvider.callBootstrapMethod@XPIProvider.jsm:4981:9 < this.XPIProvider.startup@XPIProvider.jsm:2890:13 < callProvider@AddonManager.jsm:237:12 < _startProvider@AddonManager.jsm:790:5 < AddonManagerInternal.startup@AddonManager.jsm:976:9 < this.AddonManagerPrivate.startup@AddonManager.jsm:3033:5 < amManager.prototype.observe@addonManager.js:65:9 >Jul 05 09:15:13 m72e systemd-logind[774]: Removed session c3. >Jul 05 09:15:13 m72e systemd[1]: Removed slice User Slice of gdm. >Jul 05 09:15:13 m72e firefox.desktop[8956]: 1530746113778 addons.webextension.leechblockng@proginosko.com WARN Loading extension 'leechblockng@proginosko.com': Reading manifest: Error processing permissions.1: Unknown permission "menus" >Jul 05 09:15:13 m72e firefox.desktop[8956]: 1530746113784 addons.webextension.leechblockng@proginosko.com WARN Loading extension 'leechblockng@proginosko.com': Reading manifest: Error processing optional_permissions: An unexpected property was found in the WebExtension manifest. >Jul 05 09:15:13 m72e firefox.desktop[8956]: 1530746113892 addons.webextension.https-everywhere@eff.org WARN Loading extension 'https-everywhere@eff.org': Reading manifest: Error processing devtools_page: An unexpected property was found in the WebExtension manifest. >Jul 05 09:15:13 m72e firefox.desktop[8956]: 1530746113960 addons.webextension.jid1-MnnxcxisBPnSXQ-eff@jetpack WARN Loading extension 'jid1-MnnxcxisBPnSXQ-eff@jetpack': Reading manifest: Error processing permissions.9: Unknown permission "privacy" >Jul 05 09:15:13 m72e firefox.desktop[8956]: 1530746113962 addons.webextension.jid1-MnnxcxisBPnSXQ-eff@jetpack WARN Loading extension 'jid1-MnnxcxisBPnSXQ-eff@jetpack': Reading manifest: Error processing update_url: An unexpected property was found in the WebExtension manifest. >Jul 05 09:15:13 m72e firefox.desktop[8956]: 1530746113978 addons.webextension.jid1-WiAigu4HIo0Tag@jetpack WARN Loading extension 'jid1-WiAigu4HIo0Tag@jetpack': Reading manifest: Error processing optional_permissions: An unexpected property was found in the WebExtension manifest. >Jul 05 09:15:13 m72e firefox.desktop[8956]: 1530746113990 addons.webextension.openinbrowser@www.spasche.net WARN Loading extension 'openinbrowser@www.spasche.net': Reading manifest: Error processing permissions.1: Unknown permission "menus" >Jul 05 09:15:14 m72e firefox.desktop[8956]: 1530746114088 addons.webextension.support@lastpass.com WARN Loading extension 'support@lastpass.com': Reading manifest: Error processing permissions.6: Unknown permission "privacy" >Jul 05 09:15:14 m72e firefox.desktop[8956]: 1530746114092 addons.webextension.support@lastpass.com WARN Loading extension 'support@lastpass.com': Reading manifest: Error processing optional_permissions: An unexpected property was found in the WebExtension manifest. >Jul 05 09:15:14 m72e firefox.desktop[8956]: 1530746114108 addons.webextension.uBlock0@raymondhill.net WARN Loading extension 'uBlock0@raymondhill.net': Reading manifest: Error processing permissions.1: Unknown permission "privacy" >Jul 05 09:15:14 m72e firefox.desktop[8956]: 1530746114124 addons.webextension.{2541D29A-DB9E-4c1e-949A-31EFB4AEF4E7} WARN Loading extension '{2541D29A-DB9E-4c1e-949A-31EFB4AEF4E7}': Reading manifest: Error processing permissions.0: Unknown permission "proxy" >Jul 05 09:15:14 m72e firefox.desktop[8956]: 1530746114168 addons.webextension.firefox@ghostery.com WARN Please specify whether you want browser_style or not in your browser_action options. >Jul 05 09:15:14 m72e firefox.desktop[8956]: 1530746114180 addons.webextension.https-everywhere@eff.org WARN Please specify whether you want browser_style or not in your browser_action options. >Jul 05 09:15:14 m72e firefox.desktop[8956]: 1530746114196 addons.webextension.jid1-MnnxcxisBPnSXQ-eff@jetpack WARN Please specify whether you want browser_style or not in your browser_action options. >Jul 05 09:15:14 m72e firefox.desktop[8956]: Extension error: TypeError: command.suggested_key is null chrome://browser/content/ext-commands.js 79 >Jul 05 09:15:14 m72e firefox.desktop[8956]: [[Exception stack >Jul 05 09:15:14 m72e firefox.desktop[8956]: loadCommandsFromManifest@chrome://browser/content/ext-commands.js:79:11 >Jul 05 09:15:14 m72e firefox.desktop[8956]: CommandList@chrome://browser/content/ext-commands.js:24:19 >Jul 05 09:15:14 m72e firefox.desktop[8956]: @chrome://browser/content/ext-commands.js:222:30 >Jul 05 09:15:14 m72e firefox.desktop[8956]: runSafeSyncWithoutClone@resource://gre/modules/ExtensionUtils.jsm:71:14 >Jul 05 09:15:14 m72e firefox.desktop[8956]: emit/promises<@resource://gre/modules/ExtensionUtils.jsm:384:55 >Jul 05 09:15:14 m72e firefox.desktop[8956]: emit@resource://gre/modules/ExtensionUtils.jsm:383:20 >Jul 05 09:15:14 m72e firefox.desktop[8956]: runManifest@resource://gre/modules/Extension.jsm:733:23 >Jul 05 09:15:14 m72e firefox.desktop[8956]: startup/<@resource://gre/modules/Extension.jsm:813:14 >Jul 05 09:15:14 m72e firefox.desktop[8956]: Current stack >Jul 05 09:15:14 m72e firefox.desktop[8956]: runSafeSyncWithoutClone@resource://gre/modules/ExtensionUtils.jsm:73:129 >Jul 05 09:15:14 m72e firefox.desktop[8956]: emit/promises<@resource://gre/modules/ExtensionUtils.jsm:384:55 >Jul 05 09:15:14 m72e firefox.desktop[8956]: emit@resource://gre/modules/ExtensionUtils.jsm:383:20 >Jul 05 09:15:14 m72e firefox.desktop[8956]: runManifest@resource://gre/modules/Extension.jsm:733:23 >Jul 05 09:15:14 m72e firefox.desktop[8956]: startup/<@resource://gre/modules/Extension.jsm:813:14 >Jul 05 09:15:14 m72e firefox.desktop[8956]: ]] >Jul 05 09:15:14 m72e firefox.desktop[8956]: 1530746114284 addons.webextension.{2541D29A-DB9E-4c1e-949A-31EFB4AEF4E7} WARN Please specify whether you want browser_style or not in your browser_action options. >Jul 05 09:15:16 m72e firefox.desktop[8956]: Extension error: TypeError: badger.heuristicBlocking is undefined moz-extension://c19a61bb-98ed-4d62-98ee-8e26b7d1c635/js/heuristicblocking.js 519 >Jul 05 09:15:16 m72e firefox.desktop[8956]: [[Exception stack >Jul 05 09:15:16 m72e firefox.desktop[8956]: startListeners/<@moz-extension://c19a61bb-98ed-4d62-98ee-8e26b7d1c635/js/heuristicblocking.js:519:7 >Jul 05 09:15:16 m72e firefox.desktop[8956]: Current stack >Jul 05 09:15:16 m72e firefox.desktop[8956]: runSafeSyncWithoutClone@resource://gre/modules/ExtensionUtils.jsm:73:129 >Jul 05 09:15:16 m72e firefox.desktop[8956]: runSafeSync@resource://gre/modules/ExtensionUtils.jsm:104:37 >Jul 05 09:15:16 m72e firefox.desktop[8956]: runSafe@resource://gre/modules/ExtensionCommon.jsm:123:32 >Jul 05 09:15:16 m72e firefox.desktop[8956]: receiveMessage@resource://gre/modules/ExtensionChild.jsm:586:49 >Jul 05 09:15:16 m72e firefox.desktop[8956]: _callHandlers/<@resource://gre/modules/MessageChannel.jsm:574:17 >Jul 05 09:15:16 m72e firefox.desktop[8956]: _callHandlers@resource://gre/modules/MessageChannel.jsm:573:14 >Jul 05 09:15:16 m72e firefox.desktop[8956]: _handleMessage/deferred.promise<@resource://gre/modules/MessageChannel.jsm:637:7 >Jul 05 09:15:16 m72e firefox.desktop[8956]: _handleMessage@resource://gre/modules/MessageChannel.jsm:634:24 >Jul 05 09:15:16 m72e firefox.desktop[8956]: receiveMessage@resource://gre/modules/MessageChannel.jsm:165:5 >Jul 05 09:15:16 m72e firefox.desktop[8956]: ]] >Jul 05 09:15:16 m72e firefox.desktop[8956]: Extension error: TypeError: badger.heuristicBlocking is undefined moz-extension://c19a61bb-98ed-4d62-98ee-8e26b7d1c635/js/heuristicblocking.js 519 >Jul 05 09:15:16 m72e firefox.desktop[8956]: [[Exception stack >Jul 05 09:15:16 m72e firefox.desktop[8956]: startListeners/<@moz-extension://c19a61bb-98ed-4d62-98ee-8e26b7d1c635/js/heuristicblocking.js:519:7 >Jul 05 09:15:16 m72e firefox.desktop[8956]: Current stack >Jul 05 09:15:16 m72e firefox.desktop[8956]: runSafeSyncWithoutClone@resource://gre/modules/ExtensionUtils.jsm:73:129 >Jul 05 09:15:16 m72e firefox.desktop[8956]: runSafeSync@resource://gre/modules/ExtensionUtils.jsm:104:37 >Jul 05 09:15:16 m72e firefox.desktop[8956]: runSafe@resource://gre/modules/ExtensionCommon.jsm:123:32 >Jul 05 09:15:16 m72e firefox.desktop[8956]: receiveMessage@resource://gre/modules/ExtensionChild.jsm:586:49 >Jul 05 09:15:16 m72e firefox.desktop[8956]: _callHandlers/<@resource://gre/modules/MessageChannel.jsm:574:17 >Jul 05 09:15:16 m72e firefox.desktop[8956]: _callHandlers@resource://gre/modules/MessageChannel.jsm:573:14 >Jul 05 09:15:16 m72e firefox.desktop[8956]: _handleMessage/deferred.promise<@resource://gre/modules/MessageChannel.jsm:637:7 >Jul 05 09:15:16 m72e firefox.desktop[8956]: _handleMessage@resource://gre/modules/MessageChannel.jsm:634:24 >Jul 05 09:15:16 m72e firefox.desktop[8956]: receiveMessage@resource://gre/modules/MessageChannel.jsm:165:5 >Jul 05 09:15:16 m72e firefox.desktop[8956]: ]] >Jul 05 09:15:16 m72e firefox.desktop[8956]: ERROR - ContextualIdentityService - Unknown version found in /home/whot/.mozilla/firefox/7d7utgxu.default/containers.json >Jul 05 09:15:19 m72e dbus[753]: [system] Failed to activate service 'org.bluez': timed out >Jul 05 09:15:19 m72e pulseaudio[8568]: [pulseaudio] bluez5-util.c: GetManagedObjects() failed: org.freedesktop.DBus.Error.NoReply: Did not receive a reply. Possible causes include: the remote application did not send a reply, the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken. >Jul 05 09:15:22 m72e firefox.desktop[8956]: console.error: PushService: >Jul 05 09:15:22 m72e firefox.desktop[8956]: stateChangeProcessEnqueue: Error transitioning state >Jul 05 09:15:22 m72e firefox.desktop[8956]: UnknownError >Jul 05 09:15:29 m72e firefox.desktop[8956]: 1530746129398 Sync.ErrorHandler ERROR Sync encountered a login error >Jul 05 09:15:34 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 09:15:34 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 09:15:34 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:15:34 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:15:48 m72e realmd[8246]: quitting realmd service after timeout >Jul 05 09:15:48 m72e realmd[8246]: stopping service >Jul 05 09:16:06 m72e firefox.desktop[8956]: Promise resolved after context unloaded >Jul 05 09:16:06 m72e firefox.desktop[8956]: Promise resolved after context unloaded >Jul 05 09:16:06 m72e firefox.desktop[8956]: Promise resolved after context unloaded >Jul 05 09:16:06 m72e firefox.desktop[8956]: Promise rejected after context unloaded: Message manager disconnected >Jul 05 09:16:06 m72e firefox.desktop[8956]: Promise rejected after context unloaded: Message manager disconnected >Jul 05 09:16:06 m72e firefox.desktop[8956]: Promise rejected after context unloaded: Message manager disconnected >Jul 05 09:16:06 m72e firefox.desktop[8956]: Promise rejected after context unloaded: Message manager disconnected >Jul 05 09:16:06 m72e firefox.desktop[8956]: Promise rejected after context unloaded: Message manager disconnected >Jul 05 09:16:06 m72e firefox.desktop[8956]: Promise rejected after context unloaded: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: windows.onRemoved event fired after context unloaded. >Jul 05 09:16:14 m72e firefox.desktop[8956]: windows.onRemoved event fired after context unloaded. >Jul 05 09:16:14 m72e firefox.desktop[8956]: windows.onRemoved event fired after context unloaded. >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:14 m72e firefox.desktop[8956]: Promise rejected while context is inactive: Message manager disconnected >Jul 05 09:16:15 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 09:16:15 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 09:16:15 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:16:15 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:16:23 m72e org.gnome.Shell.desktop[8558]: Window manager warning: Buggy client sent a _NET_ACTIVE_WINDOW message with a timestamp of 0 for 0x2a00010 (Mozilla Fi) >Jul 05 09:16:26 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' failed to register before timeout >Jul 05 09:16:26 m72e gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' failed to register before timeout >Jul 05 09:16:26 m72e vmware-user.desktop[9895]: vmware-user: could not open /proc/fs/vmblock/dev >Jul 05 09:16:26 m72e gnome-session-binary[8326]: Entering running state >Jul 05 09:16:26 m72e libcanberra-login-sound.desktop[9899]: Failed to play sound: File or data not found >Jul 05 09:16:27 m72e gnome-shell[8558]: STACK_OP_ADD: window 0x3c00001 already in stack >Jul 05 09:16:27 m72e com.redhat.imsettings[8337]: [ 1530746187.076837]: IMSettings-Daemon[8406]: INFO: Attempting to switch IM to none [lang=en_AU.utf8, update=false] >Jul 05 09:16:27 m72e gnome-shell[8558]: STACK_OP_ADD: window 0x3c00001 already in stack >Jul 05 09:16:27 m72e com.redhat.imsettings[8337]: No such schema âorg.gnome.settings-daemon.plugins.keyboardâ >Jul 05 09:16:27 m72e com.redhat.imsettings[8337]: [ 1530746187.278459]: IMSettings-Daemon[8406]: WARNING **: Current desktop isn't targeted by IMSettings. >Jul 05 09:16:27 m72e imsettings-start.desktop[9894]: GDBus.Error:org.gtk.GDBus.UnmappedGError.Quark._imsettings_2derror_2dquark.Code5: Current desktop isn't targeted by IMSettings. >Jul 05 09:16:27 m72e com.redhat.imsettings[8337]: Exiting... >Jul 05 09:16:27 m72e com.redhat.imsettings[8337]: [ 1530746187.284446]: IMSettings-Daemon[8406]: INFO: Unloading imesttings module: qt >Jul 05 09:16:27 m72e com.redhat.imsettings[8337]: [ 1530746187.284609]: IMSettings-Daemon[8406]: INFO: Unloading imesttings module: gsettings >Jul 05 09:16:27 m72e com.redhat.imsettings[8337]: [ 1530746187.284675]: IMSettings-Daemon[8406]: INFO: imsettings-daemon is shut down. >Jul 05 09:16:27 m72e gnome-shell[8558]: JS WARNING: [/usr/share/gnome-shell/extensions/top-icons@gnome-shell-extensions.gcampax.github.com/extension.js 118]: reference to undefined property "width" >Jul 05 09:16:27 m72e gnome-software[9886]: enabled plugins: desktop-categories, packagekit-local, packagekit-offline, packagekit-proxy, packagekit-refresh, packagekit-upgrade, packagekit, shell-extensions, systemd-updates, packagekit-url-to-app, fwupd, os-release, appstream, steam, desktop-menu-path, flatpak, hardcoded-blacklist, hardcoded-featured, hardcoded-popular, modalias, packagekit-refine, generic-updates, rewrite-resource, icons, odrs, packagekit-history, provenance, repos, key-colors, provenance-license, packagekit-refine-repos, key-colors-metadata >Jul 05 09:16:27 m72e gnome-software[9886]: disabled plugins: dpkg, dummy, fedora-pkgdb-collections, epiphany >Jul 05 09:16:27 m72e gnome-software[9886]: failed to call gs_plugin_add_updates_historical on packagekit-offline: cannot find repo mhlavink-developerdashboard >Jul 05 09:16:35 m72e PackageKit[1849]: get-updates transaction /2357_dbececdb from uid 13349 finished with success after 7467ms >Jul 05 09:16:35 m72e gnome-software[9886]: hiding category productivity featured applications: found only 0 to show, need at least 9 >Jul 05 09:16:35 m72e gnome-software[9886]: hiding category games featured applications: found only 0 to show, need at least 9 >Jul 05 09:16:35 m72e gnome-software[9886]: top-icons@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 09:16:35 m72e gnome-software[9886]: apps-menu@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 09:16:35 m72e gnome-software[9886]: window-list@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 09:16:35 m72e gnome-software[9886]: launch-new-instance@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 09:16:35 m72e gnome-software[9886]: places-menu@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 09:16:35 m72e gnome-software[9886]: alternate-tab@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 09:16:36 m72e PackageKit[1849]: resolve transaction /2358_deccceeb from uid 13349 finished with success after 966ms >Jul 05 09:16:36 m72e PackageKit[1849]: resolve transaction /2359_ebecbdac from uid 13349 finished with success after 65ms >Jul 05 09:16:36 m72e PackageKit[1849]: resolve transaction /2360_bbcdbecb from uid 13349 finished with success after 36ms >Jul 05 09:16:36 m72e gnome-software[9886]: Only 5 apps for popular list, hiding >Jul 05 09:16:36 m72e PackageKit[1849]: resolve transaction /2361_dbdacbbc from uid 13349 finished with success after 95ms >Jul 05 09:16:36 m72e PackageKit[1849]: resolve transaction /2362_deddebdb from uid 13349 finished with success after 148ms >Jul 05 09:16:39 m72e PackageKit[1849]: get-update-detail transaction /2363_abccaece from uid 13349 finished with success after 2157ms >Jul 05 09:16:39 m72e PackageKit[1849]: search-file transaction /2364_bdbceebe from uid 13349 finished with success after 12ms >Jul 05 09:16:39 m72e gnome-software[9886]: Failed to find one package for vmware-player.desktop, /usr/share/applications/vmware-player.desktop, [0] >Jul 05 09:16:39 m72e PackageKit[1849]: search-file transaction /2365_dedaaaeb from uid 13349 finished with success after 47ms >Jul 05 09:16:39 m72e PackageKit[1849]: search-file transaction /2366_eaecdbea from uid 13349 finished with success after 45ms >Jul 05 09:16:39 m72e PackageKit[1849]: search-file transaction /2367_cdbccbde from uid 13349 finished with success after 47ms >Jul 05 09:16:39 m72e PackageKit[1849]: search-file transaction /2368_bdaeadbe from uid 13349 finished with success after 47ms >Jul 05 09:16:39 m72e PackageKit[1849]: search-file transaction /2369_dececdeb from uid 13349 finished with success after 47ms >Jul 05 09:16:39 m72e dbus[753]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Jul 05 09:16:39 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:11] Failed to parse protect system value, ignoring: strict >Jul 05 09:16:39 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:12] Unknown lvalue 'ProtectKernelTunables' in section 'Service' >Jul 05 09:16:39 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:13] Unknown lvalue 'ProtectControlGroups' in section 'Service' >Jul 05 09:16:39 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:14] Unknown lvalue 'ReadWritePaths' in section 'Service' >Jul 05 09:16:39 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:23] Unknown lvalue 'MemoryDenyWriteExecute' in section 'Service' >Jul 05 09:16:39 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:26] Unknown lvalue 'ProtectKernelModules' in section 'Service' >Jul 05 09:16:39 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:29] Unknown lvalue 'RestrictRealtime' in section 'Service' >Jul 05 09:16:39 m72e systemd[1]: Starting Fingerprint Authentication Daemon... >Jul 05 09:16:39 m72e PackageKit[1849]: search-file transaction /2370_cbcececc from uid 13349 finished with success after 47ms >Jul 05 09:16:39 m72e dbus[753]: [system] Successfully activated service 'net.reactivated.Fprint' >Jul 05 09:16:39 m72e systemd[1]: Started Fingerprint Authentication Daemon. >Jul 05 09:16:40 m72e PackageKit[1849]: search-file transaction /2371_daccaaba from uid 13349 finished with success after 45ms >Jul 05 09:16:40 m72e PackageKit[1849]: search-file transaction /2372_aaccadaa from uid 13349 finished with success after 46ms >Jul 05 09:16:40 m72e PackageKit[1849]: search-file transaction /2373_cdebaead from uid 13349 finished with success after 46ms >Jul 05 09:16:40 m72e PackageKit[1849]: search-file transaction /2374_eedeacde from uid 13349 finished with success after 47ms >Jul 05 09:16:40 m72e PackageKit[1849]: search-file transaction /2375_addabebd from uid 13349 finished with success after 46ms >Jul 05 09:16:40 m72e PackageKit[1849]: search-file transaction /2376_decdbdee from uid 13349 finished with success after 47ms >Jul 05 09:16:40 m72e PackageKit[1849]: search-file transaction /2377_eecdadad from uid 13349 finished with success after 47ms >Jul 05 09:16:40 m72e PackageKit[1849]: search-file transaction /2378_caccadbc from uid 13349 finished with success after 47ms >Jul 05 09:16:41 m72e PackageKit[1849]: search-file transaction /2379_acadbdbc from uid 13349 finished with success after 47ms >Jul 05 09:16:41 m72e PackageKit[1849]: search-file transaction /2380_ccbeadca from uid 13349 finished with success after 46ms >Jul 05 09:16:41 m72e PackageKit[1849]: search-file transaction /2381_cdddbcbc from uid 13349 finished with success after 48ms >Jul 05 09:16:41 m72e PackageKit[1849]: search-file transaction /2382_abacdccc from uid 13349 finished with success after 47ms >Jul 05 09:16:41 m72e PackageKit[1849]: search-file transaction /2383_deceedde from uid 13349 finished with success after 47ms >Jul 05 09:16:41 m72e PackageKit[1849]: search-file transaction /2384_aaccabdb from uid 13349 finished with success after 47ms >Jul 05 09:16:41 m72e PackageKit[1849]: get-details transaction /2385_decdcdbe from uid 13349 finished with success after 101ms >Jul 05 09:16:42 m72e unix_chkpwd[10091]: password check failed for user (whot) >Jul 05 09:16:42 m72e sudo[10086]: pam_unix(sudo:auth): authentication failure; logname=whot uid=13349 euid=0 tty=/dev/pts/1 ruser=whot rhost= user=whot >Jul 05 09:16:47 m72e sudo[10086]: whot : TTY=pts/1 ; PWD=/home/whot ; USER=root ; COMMAND=/bin/mv /usr/bin/firefox /usr/bin/firefox.old >Jul 05 09:16:56 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: <Window object at 0x7f50f2df2f50 (terminatorlib+window+Window at 0x23220e0)> is not in registered window list >Jul 05 09:17:38 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 09:17:38 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 09:17:38 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:17:38 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:20:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 09:20:01 m72e systemd[1]: Started Session 15 of user root. >Jul 05 09:20:01 m72e CROND[10427]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 09:20:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 09:20:26 m72e dbus[753]: [system] Activating service name='com.redhat.SubscriptionManager' (using servicehelper) >Jul 05 09:20:27 m72e dbus[753]: [system] Successfully activated service 'com.redhat.SubscriptionManager' >Jul 05 09:20:43 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 09:20:43 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 09:20:43 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:20:43 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:21:08 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 09:21:08 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 09:21:08 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:21:08 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:21:11 m72e sudo[10586]: whot : TTY=pts/3 ; PWD=/home/whot ; USER=root ; COMMAND=/bin/yum remove firefox >Jul 05 09:21:18 m72e yum[10587]: Erased: firefox-52.8.0-1.el7_5.x86_64 >Jul 05 09:21:25 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: <Window object at 0x7f7e4aa1af50 (terminatorlib+window+Window at 0x2a520e0)> is not in registered window list >Jul 05 09:23:29 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 09:23:29 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 09:23:29 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:23:29 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:23:31 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 09:23:31 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 09:23:31 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:23:31 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:25:31 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 09:25:31 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 09:25:31 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:25:31 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:25:36 m72e kernel: FS-Cache: Loaded >Jul 05 09:25:36 m72e kernel: FS-Cache: Netfs 'nfs' registered for caching >Jul 05 09:25:36 m72e kernel: Key type dns_resolver registered >Jul 05 09:25:37 m72e kernel: NFS: Registering the id_resolver key type >Jul 05 09:25:37 m72e kernel: Key type id_resolver registered >Jul 05 09:25:37 m72e kernel: Key type id_legacy registered >Jul 05 09:25:37 m72e polkitd[771]: Registered Authentication Agent for unix-process:11154:548322 (system bus name :1.316 [/usr/bin/pkttyagent --notify-fd 5 --fallback], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.UTF-8) >Jul 05 09:25:37 m72e systemd[1]: Reached target Host and Network Name Lookups. >Jul 05 09:25:37 m72e systemd[1]: Starting Preprocess NFS configuration... >Jul 05 09:25:37 m72e systemd[1]: Started Preprocess NFS configuration. >Jul 05 09:25:37 m72e systemd[1]: Starting NFS status monitor for NFSv2/3 locking.... >Jul 05 09:25:37 m72e rpc.statd[11168]: Version 1.3.0 starting >Jul 05 09:25:37 m72e rpc.statd[11168]: Flags: TI-RPC >Jul 05 09:25:37 m72e systemd[1]: Starting RPC bind service... >Jul 05 09:25:37 m72e systemd[1]: Started RPC bind service. >Jul 05 09:25:37 m72e systemd[1]: Started NFS status monitor for NFSv2/3 locking.. >Jul 05 09:25:37 m72e polkitd[771]: Unregistered Authentication Agent for unix-process:11154:548322 (system bus name :1.316, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.UTF-8) (disconnected from bus) >Jul 05 09:27:14 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 09:27:14 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 09:27:14 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:27:14 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:30:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 09:30:01 m72e systemd[1]: Started Session 16 of user root. >Jul 05 09:30:01 m72e CROND[12939]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 09:30:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 09:40:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 09:40:01 m72e systemd[1]: Started Session 17 of user root. >Jul 05 09:40:01 m72e CROND[13260]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 09:40:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 09:41:55 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 09:41:55 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 09:41:55 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:41:55 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 09:46:48 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: <Window object at 0x7f5028190f50 (terminatorlib+window+Window at 0x22eb0e0)> is not in registered window list >Jul 05 09:50:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 09:50:01 m72e systemd[1]: Started Session 18 of user root. >Jul 05 09:50:01 m72e CROND[13627]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 09:50:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 10:00:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 10:00:01 m72e systemd[1]: Started Session 19 of user root. >Jul 05 10:00:01 m72e CROND[13892]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 10:00:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 10:01:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 10:01:01 m72e systemd[1]: Started Session 20 of user root. >Jul 05 10:01:01 m72e CROND[13927]: (root) CMD (run-parts /etc/cron.hourly) >Jul 05 10:01:01 m72e run-parts(/etc/cron.hourly)[13933]: starting 0anacron >Jul 05 10:01:01 m72e run-parts(/etc/cron.hourly)[13941]: finished 0anacron >Jul 05 10:01:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 10:02:25 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 10:02:25 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 10:02:25 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:02:25 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:02:34 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 10:02:34 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 10:02:34 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:02:34 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:02:45 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 10:02:45 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 10:02:45 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:02:45 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:03:07 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 10:03:07 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 10:03:07 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:03:07 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:03:51 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 10:03:51 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 10:03:51 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:03:51 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:06:27 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 10:06:27 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 10:06:27 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:06:27 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:06:48 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: <Window object at 0x7f7d75730f50 (terminatorlib+window+Window at 0x12f60e0)> is not in registered window list >Jul 05 10:10:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 10:10:01 m72e systemd[1]: Started Session 21 of user root. >Jul 05 10:10:01 m72e CROND[14603]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 10:10:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 10:20:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 10:20:01 m72e systemd[1]: Started Session 22 of user root. >Jul 05 10:20:01 m72e CROND[14756]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 10:20:02 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 10:22:41 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 10:22:41 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 10:22:41 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:22:41 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:27:57 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 10:27:57 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 10:27:57 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:27:57 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:28:40 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 10:28:40 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 10:28:40 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:28:40 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:30:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 10:30:01 m72e systemd[1]: Started Session 23 of user root. >Jul 05 10:30:01 m72e CROND[15062]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 10:30:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 10:31:12 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 10:31:12 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 10:31:12 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:31:12 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 10:34:02 m72e org.gnome.Shell.desktop[8558]: Window manager warning: Buggy client sent a _NET_ACTIVE_WINDOW message with a timestamp of 0 for 0x4000007 (meson-logs) >Jul 05 10:34:50 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: <Window object at 0x7fe6929cff50 (terminatorlib+window+Window at 0x12400e0)> is not in registered window list >Jul 05 10:37:39 m72e rhnsd[1620]: /etc/sysconfig/rhn/systemid does not exist or is unreadable >Jul 05 10:40:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 10:40:01 m72e systemd[1]: Started Session 24 of user root. >Jul 05 10:40:01 m72e CROND[15370]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 10:40:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 10:50:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 10:50:01 m72e systemd[1]: Started Session 25 of user root. >Jul 05 10:50:01 m72e CROND[15566]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 10:50:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 11:00:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 11:00:01 m72e systemd[1]: Started Session 26 of user root. >Jul 05 11:00:01 m72e CROND[15764]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 11:00:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 11:01:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 11:01:01 m72e systemd[1]: Started Session 27 of user root. >Jul 05 11:01:01 m72e CROND[15795]: (root) CMD (run-parts /etc/cron.hourly) >Jul 05 11:01:01 m72e run-parts(/etc/cron.hourly)[15801]: starting 0anacron >Jul 05 11:01:01 m72e run-parts(/etc/cron.hourly)[15808]: finished 0anacron >Jul 05 11:01:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 11:01:43 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: <Window object at 0x7f8eb49c7f50 (terminatorlib+window+Window at 0x16830e0)> is not in registered window list >Jul 05 11:10:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 11:10:01 m72e systemd[1]: Started Session 28 of user root. >Jul 05 11:10:01 m72e CROND[16111]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 11:10:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 11:10:50 m72e kernel: perf: interrupt took too long (2503 > 2500), lowering kernel.perf_event_max_sample_rate to 79000 >Jul 05 11:15:36 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 11:15:36 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 11:15:36 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:15:36 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:20:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 11:20:01 m72e systemd[1]: Started Session 29 of user root. >Jul 05 11:20:01 m72e CROND[16381]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 11:20:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 11:20:54 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 11:20:54 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 11:20:54 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:20:54 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:21:25 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 11:21:25 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 11:21:25 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:21:25 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:22:15 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 11:22:15 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 11:22:15 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:22:15 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:28:34 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 11:28:34 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 11:28:34 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:28:34 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:30:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 11:30:01 m72e systemd[1]: Started Session 30 of user root. >Jul 05 11:30:01 m72e CROND[17261]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 11:30:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 11:31:21 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 11:31:21 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 11:31:21 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:31:21 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:37:24 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 11:37:24 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 11:37:24 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:37:24 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:40:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 11:40:01 m72e systemd[1]: Started Session 31 of user root. >Jul 05 11:40:01 m72e CROND[17555]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 11:40:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 11:40:05 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: <Window object at 0x7f4498902f50 (terminatorlib+window+Window at 0x112d0e0)> is not in registered window list >Jul 05 11:46:15 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 11:46:15 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 11:46:15 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:46:15 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:50:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 11:50:01 m72e systemd[1]: Started Session 32 of user root. >Jul 05 11:50:01 m72e CROND[17819]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 11:50:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 11:52:30 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 11:52:30 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 11:52:30 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:52:30 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:56:51 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 11:56:51 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 11:56:51 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 11:56:51 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 12:00:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 12:00:01 m72e systemd[1]: Started Session 33 of user root. >Jul 05 12:00:01 m72e CROND[18119]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 12:00:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 12:01:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 12:01:01 m72e systemd[1]: Started Session 34 of user root. >Jul 05 12:01:01 m72e CROND[18149]: (root) CMD (run-parts /etc/cron.hourly) >Jul 05 12:01:01 m72e run-parts(/etc/cron.hourly)[18154]: starting 0anacron >Jul 05 12:01:01 m72e run-parts(/etc/cron.hourly)[18161]: finished 0anacron >Jul 05 12:01:02 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 12:10:02 m72e systemd[1]: Created slice User Slice of root. >Jul 05 12:10:02 m72e systemd[1]: Started Session 35 of user root. >Jul 05 12:10:02 m72e CROND[18271]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 12:10:02 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 12:10:54 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 12:10:54 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 12:10:54 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 12:10:54 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 12:20:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 12:20:01 m72e systemd[1]: Started Session 36 of user root. >Jul 05 12:20:01 m72e CROND[18448]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 12:20:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 12:30:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 12:30:01 m72e systemd[1]: Started Session 37 of user root. >Jul 05 12:30:01 m72e CROND[18577]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 12:30:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 12:30:38 m72e kernel: perf: interrupt took too long (3143 > 3128), lowering kernel.perf_event_max_sample_rate to 63000 >Jul 05 12:34:06 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 12:34:06 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 12:34:06 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 12:34:06 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 12:39:14 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 12:39:14 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 12:39:14 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 12:39:14 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 12:39:17 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 12:39:17 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 12:39:17 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 12:39:17 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 12:40:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 12:40:01 m72e systemd[1]: Started Session 38 of user root. >Jul 05 12:40:01 m72e CROND[18956]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 12:40:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 12:49:17 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: <Window object at 0x7f09e9d0ff50 (terminatorlib+window+Window at 0x21cc0e0)> is not in registered window list >Jul 05 12:50:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 12:50:01 m72e systemd[1]: Started Session 39 of user root. >Jul 05 12:50:01 m72e CROND[19180]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 12:50:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 13:00:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 13:00:01 m72e systemd[1]: Started Session 40 of user root. >Jul 05 13:00:01 m72e CROND[19325]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 13:00:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 13:01:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 13:01:01 m72e systemd[1]: Started Session 41 of user root. >Jul 05 13:01:01 m72e CROND[19357]: (root) CMD (run-parts /etc/cron.hourly) >Jul 05 13:01:01 m72e run-parts(/etc/cron.hourly)[19362]: starting 0anacron >Jul 05 13:01:01 m72e run-parts(/etc/cron.hourly)[19370]: finished 0anacron >Jul 05 13:01:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 13:10:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 13:10:01 m72e systemd[1]: Started Session 42 of user root. >Jul 05 13:10:01 m72e CROND[19487]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 13:10:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 13:10:11 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 13:10:11 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 13:10:11 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 13:10:11 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 13:20:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 13:20:01 m72e systemd[1]: Started Session 43 of user root. >Jul 05 13:20:01 m72e CROND[19698]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 13:20:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 13:30:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 13:30:01 m72e systemd[1]: Started Session 44 of user root. >Jul 05 13:30:01 m72e CROND[19821]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 13:30:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 13:40:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 13:40:01 m72e systemd[1]: Started Session 45 of user root. >Jul 05 13:40:01 m72e CROND[20064]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 13:40:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 13:46:45 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 13:46:45 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 13:46:45 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 13:46:45 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 13:47:27 m72e org.gnome.Shell.desktop[8558]: Window manager warning: Buggy client sent a _NET_ACTIVE_WINDOW message with a timestamp of 0 for 0x2600007 (artifacts-) >Jul 05 13:47:27 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'width' of type 'gfloat' >Jul 05 13:47:27 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'height' of type 'gfloat' >Jul 05 13:47:27 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'width' of type 'gfloat' >Jul 05 13:47:27 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'height' of type 'gfloat' >Jul 05 13:47:27 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'width' of type 'gfloat' >Jul 05 13:47:27 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'height' of type 'gfloat' >Jul 05 13:47:27 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'width' of type 'gfloat' >Jul 05 13:47:27 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'height' of type 'gfloat' >Jul 05 13:47:27 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'width' of type 'gfloat' >Jul 05 13:47:27 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'height' of type 'gfloat' >Jul 05 13:47:27 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'width' of type 'gfloat' >Jul 05 13:47:27 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'height' of type 'gfloat' >Jul 05 13:47:27 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'width' of type 'gfloat' >Jul 05 13:47:27 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'height' of type 'gfloat' >Jul 05 13:47:27 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'width' of type 'gfloat' >Jul 05 13:47:27 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'height' of type 'gfloat' >Jul 05 13:49:51 m72e org.gnome.Shell.desktop[8558]: Window manager warning: Buggy client sent a _NET_ACTIVE_WINDOW message with a timestamp of 0 for 0x2603ec7 (artifacts-) >Jul 05 13:50:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 13:50:01 m72e systemd[1]: Started Session 46 of user root. >Jul 05 13:50:01 m72e CROND[20320]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 13:50:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 13:52:32 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 13:52:32 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 13:52:32 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 13:52:32 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 14:00:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 14:00:01 m72e systemd[1]: Started Session 47 of user root. >Jul 05 14:00:01 m72e CROND[20577]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 14:00:02 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 14:01:02 m72e systemd[1]: Created slice User Slice of root. >Jul 05 14:01:02 m72e systemd[1]: Started Session 48 of user root. >Jul 05 14:01:02 m72e CROND[20607]: (root) CMD (run-parts /etc/cron.hourly) >Jul 05 14:01:02 m72e run-parts(/etc/cron.hourly)[20612]: starting 0anacron >Jul 05 14:01:02 m72e run-parts(/etc/cron.hourly)[20620]: finished 0anacron >Jul 05 14:01:02 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 14:09:00 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 14:09:00 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 14:09:00 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 14:09:00 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 14:10:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 14:10:01 m72e systemd[1]: Started Session 49 of user root. >Jul 05 14:10:01 m72e CROND[20942]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 14:10:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 14:10:24 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 14:10:24 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 14:10:24 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 14:10:24 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 14:12:31 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 14:12:31 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 14:12:31 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 14:12:31 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 14:14:29 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 14:14:29 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 14:14:29 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 14:14:29 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 14:20:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 14:20:01 m72e systemd[1]: Started Session 50 of user root. >Jul 05 14:20:01 m72e CROND[21311]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 14:20:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 14:20:05 m72e kernel: perf: interrupt took too long (4040 > 3928), lowering kernel.perf_event_max_sample_rate to 49000 >Jul 05 14:23:48 m72e thunderbird.desktop[21441]: [calBackendLoader] Using Thunderbird's builtin libical backend >Jul 05 14:26:22 m72e thunderbird.desktop[21441]: 1530764782380 addons.update-checker WARN Update manifest for {AF40CC63-C6FE-4510-8F66-3B89E2D06400} did not contain an updates property >Jul 05 14:26:22 m72e thunderbird.desktop[21441]: 1530764782608 addons.update-checker WARN Update manifest for {972ce4c6-7e08-4474-a285-3208198ce6fd} did not contain an updates property >Jul 05 14:28:14 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: <Window object at 0x7ff9a13a6f50 (terminatorlib+window+Window at 0x23d10e0)> is not in registered window list >Jul 05 14:28:20 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: <Window object at 0x7fc52ea6bf50 (terminatorlib+window+Window at 0x19de0e0)> is not in registered window list >Jul 05 14:30:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 14:30:01 m72e systemd[1]: Started Session 51 of user root. >Jul 05 14:30:01 m72e CROND[21640]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 14:30:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 14:36:20 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 14:36:20 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 14:36:20 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 14:36:20 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 14:36:48 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 14:36:48 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 14:36:48 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 14:36:48 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 14:37:39 m72e rhnsd[1620]: /etc/sysconfig/rhn/systemid does not exist or is unreadable >Jul 05 14:38:31 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: <Window object at 0x7fac8c426f50 (terminatorlib+window+Window at 0x290d0e0)> is not in registered window list >Jul 05 14:40:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 14:40:01 m72e systemd[1]: Started Session 52 of user root. >Jul 05 14:40:01 m72e CROND[22080]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 14:40:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 14:40:50 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: <Window object at 0x7fdd60c4bf50 (terminatorlib+window+Window at 0x2c420e0)> is not in registered window list >Jul 05 14:42:59 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: Unable to bind hide_window key, another instance/window has it. >Jul 05 14:42:59 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 14:42:59 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 14:42:59 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 14:44:40 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'width' of type 'gfloat' >Jul 05 14:44:40 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'height' of type 'gfloat' >Jul 05 14:44:40 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'width' of type 'gfloat' >Jul 05 14:44:40 m72e gnome-shell[8558]: value "-1.000000" of type 'gfloat' is invalid or out of range for property 'height' of type 'gfloat' >Jul 05 14:47:01 m72e gnome-shell[8558]: JS WARNING: [resource:///org/gnome/shell/ui/popupMenu.js 717]: reference to undefined property "_delegate" >Jul 05 14:47:02 m72e gnome-shell[8558]: g_array_unref: assertion 'array' failed >Jul 05 14:50:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 14:50:01 m72e systemd[1]: Started Session 53 of user root. >Jul 05 14:50:01 m72e CROND[22335]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 14:50:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 15:00:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 15:00:01 m72e systemd[1]: Started Session 54 of user root. >Jul 05 15:00:01 m72e CROND[22455]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 15:00:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 15:01:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 15:01:01 m72e systemd[1]: Started Session 55 of user root. >Jul 05 15:01:01 m72e CROND[22489]: (root) CMD (run-parts /etc/cron.hourly) >Jul 05 15:01:01 m72e run-parts(/etc/cron.hourly)[22494]: starting 0anacron >Jul 05 15:01:01 m72e run-parts(/etc/cron.hourly)[22502]: finished 0anacron >Jul 05 15:01:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 15:10:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 15:10:01 m72e systemd[1]: Started Session 56 of user root. >Jul 05 15:10:01 m72e CROND[22611]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 15:10:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 15:17:52 m72e dbus[753]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Jul 05 15:17:52 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:11] Failed to parse protect system value, ignoring: strict >Jul 05 15:17:52 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:12] Unknown lvalue 'ProtectKernelTunables' in section 'Service' >Jul 05 15:17:52 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:13] Unknown lvalue 'ProtectControlGroups' in section 'Service' >Jul 05 15:17:52 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:14] Unknown lvalue 'ReadWritePaths' in section 'Service' >Jul 05 15:17:52 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:23] Unknown lvalue 'MemoryDenyWriteExecute' in section 'Service' >Jul 05 15:17:52 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:26] Unknown lvalue 'ProtectKernelModules' in section 'Service' >Jul 05 15:17:52 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:29] Unknown lvalue 'RestrictRealtime' in section 'Service' >Jul 05 15:17:52 m72e systemd[1]: Starting Fingerprint Authentication Daemon... >Jul 05 15:17:52 m72e dbus[753]: [system] Successfully activated service 'net.reactivated.Fprint' >Jul 05 15:17:52 m72e systemd[1]: Started Fingerprint Authentication Daemon. >Jul 05 15:17:52 m72e gnome-shell[8558]: Some code accessed the property 'AuthList' on the module 'authList'. That property was defined with 'let' or 'const' inside the module. This was previously supported, but is not correct according to the ES6 standard. Any symbols to be exported from a module must be defined with 'var'. The property access will work as previously for the time being, but please fix your code anyway. >Jul 05 15:17:54 m72e gdm-password][22709]: gkr-pam: unlocked login keyring >Jul 05 15:17:54 m72e gdm[8000]: *** Error in `/usr/sbin/gdm': double free or corruption (fasttop): 0x000055c2cdd06e20 *** >Jul 05 15:17:54 m72e gdm[8000]: ======= Backtrace: ========= >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libc.so.6(+0x81489)[0x7f9903e9e489] >Jul 05 15:17:54 m72e gdm[8000]: /usr/sbin/gdm(+0x1a552)[0x55c2ccccd552] >Jul 05 15:17:54 m72e gdm[8000]: /usr/sbin/gdm(+0x1a653)[0x55c2ccccd653] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libgobject-2.0.so.0(g_cclosure_marshal_VOID__STRINGv+0x99)[0x7f9904fd6899] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libgobject-2.0.so.0(+0xfbb7)[0x7f9904fd3bb7] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libgobject-2.0.so.0(g_signal_emit_valist+0x477)[0x7f9904fed657] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libgobject-2.0.so.0(g_signal_emit+0x8f)[0x7f9904fee2df] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libffi.so.6(ffi_call_unix64+0x4c)[0x7f9903c1adcc] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libffi.so.6(ffi_call+0x1f5)[0x7f9903c1a6f5] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libgobject-2.0.so.0(g_cclosure_marshal_generic+0x1f8)[0x7f9904fd41c8] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libgobject-2.0.so.0(g_closure_invoke+0x138)[0x7f9904fd3988] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libgobject-2.0.so.0(+0x2205d)[0x7f9904fe605d] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libgobject-2.0.so.0(g_signal_emitv+0x231)[0x7f9904fed171] >Jul 05 15:17:54 m72e gdm[8000]: /usr/sbin/gdm(+0x3e803)[0x55c2cccf1803] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libffi.so.6(ffi_call_unix64+0x4c)[0x7f9903c1adcc] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libffi.so.6(ffi_call+0x1f5)[0x7f9903c1a6f5] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libgobject-2.0.so.0(g_cclosure_marshal_generic+0x1f8)[0x7f9904fd41c8] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libgobject-2.0.so.0(g_closure_invoke+0x138)[0x7f9904fd3988] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libgobject-2.0.so.0(+0x21e1b)[0x7f9904fe5e1b] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libgobject-2.0.so.0(g_signal_emit_valist+0xe11)[0x7f9904fedff1] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libgobject-2.0.so.0(g_signal_emit+0x8f)[0x7f9904fee2df] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libgio-2.0.so.0(+0xcbcec)[0x7f99052dfcec] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libgio-2.0.so.0(+0xbb2a5)[0x7f99052cf2a5] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libglib-2.0.so.0(+0x48c77)[0x7f9904cf6c77] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libglib-2.0.so.0(g_main_context_dispatch+0x159)[0x7f9904cfa049] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libglib-2.0.so.0(+0x4c3a8)[0x7f9904cfa3a8] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libglib-2.0.so.0(g_main_loop_run+0x6a)[0x7f9904cfa67a] >Jul 05 15:17:54 m72e gdm[8000]: /usr/sbin/gdm(+0xfcd1)[0x55c2cccc2cd1] >Jul 05 15:17:54 m72e gdm[8000]: /lib64/libc.so.6(__libc_start_main+0xf5)[0x7f9903e3f3d5] >Jul 05 15:17:54 m72e gdm[8000]: /usr/sbin/gdm(+0xff59)[0x55c2cccc2f59] >Jul 05 15:17:54 m72e gdm[8000]: ======= Memory map: ======== >Jul 05 15:17:54 m72e gdm[8000]: 55c2cccb3000-55c2ccd14000 r-xp 00000000 08:02 404246096 /usr/sbin/gdm >Jul 05 15:17:54 m72e gdm[8000]: 55c2ccf14000-55c2ccf1a000 r--p 00061000 08:02 404246096 /usr/sbin/gdm >Jul 05 15:17:54 m72e gdm[8000]: 55c2ccf1a000-55c2ccf1b000 rw-p 00067000 08:02 404246096 /usr/sbin/gdm >Jul 05 15:17:54 m72e gdm[8000]: 55c2cdcb1000-55c2cdd30000 rw-p 00000000 00:00 0 [heap] >Jul 05 15:17:54 m72e gdm[8000]: 7f98e4000000-7f98e4022000 rw-p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98e4022000-7f98e8000000 ---p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98ec000000-7f98ec022000 rw-p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98ec022000-7f98f0000000 ---p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98f0000000-7f98f0021000 rw-p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98f0021000-7f98f4000000 ---p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98f4000000-7f98f4021000 rw-p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98f4021000-7f98f8000000 ---p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98f82f0000-7f98f82f1000 ---p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98f82f1000-7f98f8af1000 rw-p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98f8af1000-7f98f8af2000 ---p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98f8af2000-7f98f92f2000 rw-p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98f92f2000-7f98f92f3000 ---p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98f92f3000-7f98f9af3000 rw-p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98f9af3000-7f98f9af4000 ---p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98f9af4000-7f98fa2f4000 rw-p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98fa2f4000-7f98fa300000 r-xp 00000000 08:02 404810219 /usr/lib64/libnss_files-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f98fa300000-7f98fa4ff000 ---p 0000c000 08:02 404810219 /usr/lib64/libnss_files-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f98fa4ff000-7f98fa500000 r--p 0000b000 08:02 404810219 /usr/lib64/libnss_files-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f98fa500000-7f98fa501000 rw-p 0000c000 08:02 404810219 /usr/lib64/libnss_files-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f98fa501000-7f98fa507000 rw-p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f98fa507000-7f9900a31000 r--p 00000000 08:02 134232878 /usr/lib/locale/locale-archive >Jul 05 15:17:54 m72e gdm[8000]: 7f9900a31000-7f9900a40000 r-xp 00000000 08:02 402759191 /usr/lib64/libbz2.so.1.0.6 >Jul 05 15:17:54 m72e gdm[8000]: 7f9900a40000-7f9900c3f000 ---p 0000f000 08:02 402759191 /usr/lib64/libbz2.so.1.0.6 >Jul 05 15:17:54 m72e gdm[8000]: 7f9900c3f000-7f9900c40000 r--p 0000e000 08:02 402759191 /usr/lib64/libbz2.so.1.0.6 >Jul 05 15:17:54 m72e gdm[8000]: 7f9900c40000-7f9900c41000 rw-p 0000f000 08:02 402759191 /usr/lib64/libbz2.so.1.0.6 >Jul 05 15:17:54 m72e gdm[8000]: 7f9900c41000-7f9900c58000 r-xp 00000000 08:02 402759180 /usr/lib64/libelf-0.172.so >Jul 05 15:17:54 m72e gdm[8000]: 7f9900c58000-7f9900e57000 ---p 00017000 08:02 402759180 /usr/lib64/libelf-0.172.so >Jul 05 15:17:54 m72e gdm[8000]: 7f9900e57000-7f9900e58000 r--p 00016000 08:02 402759180 /usr/lib64/libelf-0.172.so >Jul 05 15:17:54 m72e gdm[8000]: 7f9900e58000-7f9900e59000 rw-p 00017000 08:02 402759180 /usr/lib64/libelf-0.172.so >Jul 05 15:17:54 m72e gdm[8000]: 7f9900e59000-7f9900e5d000 r-xp 00000000 08:02 402687657 /usr/lib64/libattr.so.1.1.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f9900e5d000-7f990105c000 ---p 00004000 08:02 402687657 /usr/lib64/libattr.so.1.1.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f990105c000-7f990105d000 r--p 00003000 08:02 402687657 /usr/lib64/libattr.so.1.1.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f990105d000-7f990105e000 rw-p 00004000 08:02 402687657 /usr/lib64/libattr.so.1.1.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f990105e000-7f9901060000 r-xp 00000000 08:02 402660474 /usr/lib64/libfreebl3.so >Jul 05 15:17:54 m72e gdm[8000]: 7f9901060000-7f990125f000 ---p 00002000 08:02 402660474 /usr/lib64/libfreebl3.so >Jul 05 15:17:54 m72e gdm[8000]: 7f990125f000-7f9901260000 r--p 00001000 08:02 402660474 /usr/lib64/libfreebl3.so >Jul 05 15:17:54 m72e gdm[8000]: 7f9901260000-7f9901261000 rw-p 00002000 08:02 402660474 /usr/lib64/libfreebl3.so >Jul 05 15:17:54 m72e gdm[8000]: 7f9901261000-7f9901265000 r-xp 00000000 08:02 404318661 /usr/lib64/libuuid.so.1.3.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901265000-7f9901464000 ---p 00004000 08:02 404318661 /usr/lib64/libuuid.so.1.3.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901464000-7f9901465000 r--p 00003000 08:02 404318661 /usr/lib64/libuuid.so.1.3.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901465000-7f9901466000 rw-p 00004000 08:02 404318661 /usr/lib64/libuuid.so.1.3.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901466000-7f99014a2000 r-xp 00000000 08:02 404363268 /usr/lib64/libblkid.so.1.1.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f99014a2000-7f99016a1000 ---p 0003c000 08:02 404363268 /usr/lib64/libblkid.so.1.1.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f99016a1000-7f99016a4000 r--p 0003b000 08:02 404363268 /usr/lib64/libblkid.so.1.1.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f99016a4000-7f99016a5000 rw-p 0003e000 08:02 404363268 /usr/lib64/libblkid.so.1.1.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f99016a5000-7f99016a6000 rw-p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f99016a6000-7f99016f2000 r-xp 00000000 08:02 402654656 /usr/lib64/libdw-0.172.so >Jul 05 15:17:54 m72e gdm[8000]: 7f99016f2000-7f99018f2000 ---p 0004c000 08:02 402654656 /usr/lib64/libdw-0.172.so >Jul 05 15:17:54 m72e gdm[8000]: 7f99018f2000-7f99018f4000 r--p 0004c000 08:02 402654656 /usr/lib64/libdw-0.172.so >Jul 05 15:17:54 m72e gdm[8000]: 7f99018f4000-7f99018f5000 rw-p 0004e000 08:02 402654656 /usr/lib64/libdw-0.172.so >Jul 05 15:17:54 m72e gdm[8000]: 7f99018f5000-7f99018f9000 r-xp 00000000 08:02 402825383 /usr/lib64/libgpg-error.so.0.10.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f99018f9000-7f9901af8000 ---p 00004000 08:02 402825383 /usr/lib64/libgpg-error.so.0.10.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901af8000-7f9901af9000 r--p 00003000 08:02 402825383 /usr/lib64/libgpg-error.so.0.10.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901af9000-7f9901afa000 rw-p 00004000 08:02 402825383 /usr/lib64/libgpg-error.so.0.10.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901afa000-7f9901b77000 r-xp 00000000 08:02 402758938 /usr/lib64/libgcrypt.so.11.8.2 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901b77000-7f9901d76000 ---p 0007d000 08:02 402758938 /usr/lib64/libgcrypt.so.11.8.2 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901d76000-7f9901d77000 r--p 0007c000 08:02 402758938 /usr/lib64/libgcrypt.so.11.8.2 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901d77000-7f9901d7a000 rw-p 0007d000 08:02 402758938 /usr/lib64/libgcrypt.so.11.8.2 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901d7a000-7f9901d7b000 rw-p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901d7b000-7f9901d8f000 r-xp 00000000 08:02 402659900 /usr/lib64/liblz4.so.1.7.5 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901d8f000-7f9901f8e000 ---p 00014000 08:02 402659900 /usr/lib64/liblz4.so.1.7.5 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901f8e000-7f9901f8f000 r--p 00013000 08:02 402659900 /usr/lib64/liblz4.so.1.7.5 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901f8f000-7f9901f90000 rw-p 00014000 08:02 402659900 /usr/lib64/liblz4.so.1.7.5 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901f90000-7f9901fb5000 r-xp 00000000 08:02 404286709 /usr/lib64/liblzma.so.5.2.2 >Jul 05 15:17:54 m72e gdm[8000]: 7f9901fb5000-7f99021b4000 ---p 00025000 08:02 404286709 /usr/lib64/liblzma.so.5.2.2 >Jul 05 15:17:54 m72e gdm[8000]: 7f99021b4000-7f99021b5000 r--p 00024000 08:02 404286709 /usr/lib64/liblzma.so.5.2.2 >Jul 05 15:17:54 m72e gdm[8000]: 7f99021b5000-7f99021b6000 rw-p 00025000 08:02 404286709 /usr/lib64/liblzma.so.5.2.2 >Jul 05 15:17:54 m72e gdm[8000]: 7f99021b6000-7f99021bd000 r-xp 00000000 08:02 404810226 /usr/lib64/librt-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f99021bd000-7f99023bc000 ---p 00007000 08:02 404810226 /usr/lib64/librt-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f99023bc000-7f99023bd000 r--p 00006000 08:02 404810226 /usr/lib64/librt-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f99023bd000-7f99023be000 rw-p 00007000 08:02 404810226 /usr/lib64/librt-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f99023be000-7f99024bf000 r-xp 00000000 08:02 404810209 /usr/lib64/libm-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f99024bf000-7f99026be000 ---p 00101000 08:02 404810209 /usr/lib64/libm-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f99026be000-7f99026bf000 r--p 00100000 08:02 404810209 /usr/lib64/libm-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f99026bf000-7f99026c0000 rw-p 00101000 08:02 404810209 /usr/lib64/libm-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f99026c0000-7f99026c4000 r-xp 00000000 08:02 402713865 /usr/lib64/libcap.so.2.22 >Jul 05 15:17:54 m72e gdm[8000]: 7f99026c4000-7f99028c3000 ---p 00004000 08:02 402713865 /usr/lib64/libcap.so.2.22 >Jul 05 15:17:54 m72e gdm[8000]: 7f99028c3000-7f99028c4000 r--p 00003000 08:02 402713865 /usr/lib64/libcap.so.2.22 >Jul 05 15:17:54 m72e gdm[8000]: 7f99028c4000-7f99028c5000 rw-p 00004000 08:02 402713865 /usr/lib64/libcap.so.2.22 >Jul 05 15:17:54 m72e gdm[8000]: 7f99028c5000-7f99028cd000 r-xp 00000000 08:02 404230255 /usr/lib64/libcrypt-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f99028cd000-7f9902acc000 ---p 00008000 08:02 404230255 /usr/lib64/libcrypt-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f9902acc000-7f9902acd000 r--p 00007000 08:02 404230255 /usr/lib64/libcrypt-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f9902acd000-7f9902ace000 rw-p 00008000 08:02 404230255 /usr/lib64/libcrypt-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f9902ace000-7f9902afc000 rw-p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f9902afc000-7f9902b11000 r-xp 00000000 08:02 404614628 /usr/lib64/libgcc_s-4.8.5-20150702.so.1 >Jul 05 15:17:54 m72e gdm[8000]: 7f9902b11000-7f9902d10000 ---p 00015000 08:02 404614628 /usr/lib64/libgcc_s-4.8.5-20150702.so.1 >Jul 05 15:17:54 m72e gdm[8000]: 7f9902d10000-7f9902d11000 r--p 00014000 08:02 404614628 /usr/lib64/libgcc_s-4.8.5-20150702.so.1 >Jul 05 15:17:54 m72e gdm[8000]: 7f9902d11000-7f9902d12000 rw-p 00015000 08:02 404614628 /usr/lib64/libgcc_s-4.8.5-20150702.so.1 >Jul 05 15:17:54 m72e gdm[8000]: 7f9902d12000-7f9902d52000 r-xp 00000000 08:02 404934324 /usr/lib64/libmount.so.1.1.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f9902d52000-7f9902f52000 ---p 00040000 08:02 404934324 /usr/lib64/libmount.so.1.1.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f9902f52000-7f9902f53000 r--p 00040000 08:02 404934324 /usr/lib64/libmount.so.1.1.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f9902f53000-7f9902f54000 rw-p 00041000 08:02 404934324 /usr/lib64/libmount.so.1.1.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f9902f54000-7f9902f55000 rw-p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f9902f55000-7f9902f6b000 r-xp 00000000 08:02 404810224 /usr/lib64/libresolv-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f9902f6b000-7f990316a000 ---p 00016000 08:02 404810224 /usr/lib64/libresolv-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f990316a000-7f990316b000 r--p 00015000 08:02 404810224 /usr/lib64/libresolv-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f990316b000-7f990316c000 rw-p 00016000 08:02 404810224 /usr/lib64/libresolv-2.17.so >Jul 05 15:17:54 m72e gdm[8000]: 7f990316c000-7f990316e000 rw-p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f990316e000-7f9903192000 r-xp 00000000 08:02 404810237 /usr/lib64/libselinux.so.1 >Jul 05 15:17:54 m72e gdm[8000]: 7f9903192000-7f9903391000 ---p 00024000 08:02 404810237 /usr/lib64/libselinux.so.1 >Jul 05 15:17:54 m72e gdm[8000]: 7f9903391000-7f9903392000 r--p 00023000 08:02 404810237 /usr/lib64/libselinux.so.1 >Jul 05 15:17:54 m72e gdm[8000]: 7f9903392000-7f9903393000 rw-p 00024000 08:02 404810237 /usr/lib64/libselinux.so.1 >Jul 05 15:17:54 m72e gdm[8000]: 7f9903393000-7f9903395000 rw-p 00000000 00:00 0 >Jul 05 15:17:54 m72e gdm[8000]: 7f9903395000-7f99033aa000 r-xp 00000000 08:02 402666844 /usr/lib64/libz.so.1.2.7 >Jul 05 15:17:54 m72e gdm[8000]: 7f99033aa000-7f99035a9000 ---p 00015000 08:02 402666844 /usr/lib64/libz.so.1.2.7 >Jul 05 15:17:54 m72e gdm[8000]: 7f99035a9000-7f99035aa000 r--p 00014000 08:02 402666844 /usr/lib64/libz.so.1.2.7 >Jul 05 15:17:54 m72e abrt-hook-ccpp[22718]: Process 8000 (gdm) of user 0 killed by SIGABRT - dumping core >Jul 05 15:17:54 m72e gdm[8000]: 7f99035aa000-7f99035ab000 rw-p 00015000 08:02 402666844 /usr/lib64/libz.so.1.2.7 >Jul 05 15:17:54 m72e gdm[8000]: 7f99035ab000-7f990360b000 r-xp 00000000 08:02 402659796 /usr/lib64/libpcre.so.1.2.0 >Jul 05 15:17:54 m72e gdm[8000]: 7f990360b000-7f990380b000 ---p 00060000 08:02 402659796 /usr/lib64/libpcre.so.1.2.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f990380b000-7f990380c000 r--p 00060000 08:02 402659796 /usr/lib64/libpcre.so.1.2.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f990380c000-7f990380d000 rw-p 00061000 08:02 402659796 /usr/lib64/libpcre.so.1.2.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f990380d000-7f990380f000 r-xp 00000000 08:02 404320734 /usr/lib64/libdl-2.17.so >Jul 05 15:17:55 m72e gdm[8000]: 7f990380f000-7f9903a0f000 ---p 00002000 08:02 404320734 /usr/lib64/libdl-2.17.so >Jul 05 15:17:55 m72e gdm[8000]: 7f9903a0f000-7f9903a10000 r--p 00002000 08:02 404320734 /usr/lib64/libdl-2.17.so >Jul 05 15:17:55 m72e gdm[8000]: 7f9903a10000-7f9903a11000 rw-p 00003000 08:02 404320734 /usr/lib64/libdl-2.17.so >Jul 05 15:17:55 m72e gdm[8000]: 7f9903a11000-7f9903a14000 r-xp 00000000 08:02 404999367 /usr/lib64/libgmodule-2.0.so.0.5600.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f9903a14000-7f9903c13000 ---p 00003000 08:02 404999367 /usr/lib64/libgmodule-2.0.so.0.5600.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f9903c13000-7f9903c14000 r--p 00002000 08:02 404999367 /usr/lib64/libgmodule-2.0.so.0.5600.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f9903c14000-7f9903c15000 rw-p 00003000 08:02 404999367 /usr/lib64/libgmodule-2.0.so.0.5600.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f9903c15000-7f9903c1c000 r-xp 00000000 08:02 403056696 /usr/lib64/libffi.so.6.0.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f9903c1c000-7f9903e1b000 ---p 00007000 08:02 403056696 /usr/lib64/libffi.so.6.0.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f9903e1b000-7f9903e1c000 r--p 00006000 08:02 403056696 /usr/lib64/libffi.so.6.0.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f9903e1c000-7f9903e1d000 rw-p 00007000 08:02 403056696 /usr/lib64/libffi.so.6.0.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f9903e1d000-7f9903fdf000 r-xp 00000000 08:02 402655539 /usr/lib64/libc-2.17.so >Jul 05 15:17:55 m72e gdm[8000]: 7f9903fdf000-7f99041df000 ---p 001c2000 08:02 402655539 /usr/lib64/libc-2.17.so >Jul 05 15:17:55 m72e gdm[8000]: 7f99041df000-7f99041e3000 r--p 001c2000 08:02 402655539 /usr/lib64/libc-2.17.so >Jul 05 15:17:55 m72e gdm[8000]: 7f99041e3000-7f99041e5000 rw-p 001c6000 08:02 402655539 /usr/lib64/libc-2.17.so >Jul 05 15:17:55 m72e gdm[8000]: 7f99041e5000-7f99041ea000 rw-p 00000000 00:00 0 >Jul 05 15:17:55 m72e gdm[8000]: 7f99041ea000-7f9904201000 r-xp 00000000 08:02 402660476 /usr/lib64/libpthread-2.17.so >Jul 05 15:17:55 m72e gdm[8000]: 7f9904201000-7f9904400000 ---p 00017000 08:02 402660476 /usr/lib64/libpthread-2.17.so >Jul 05 15:17:55 m72e gdm[8000]: 7f9904400000-7f9904401000 r--p 00016000 08:02 402660476 /usr/lib64/libpthread-2.17.so >Jul 05 15:17:55 m72e gdm[8000]: 7f9904401000-7f9904402000 rw-p 00017000 08:02 402660476 /usr/lib64/libpthread-2.17.so >Jul 05 15:17:55 m72e gdm[8000]: 7f9904402000-7f9904406000 rw-p 00000000 00:00 0 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904406000-7f9904435000 r-xp 00000000 08:02 402881184 /usr/lib64/libsystemd.so.0.6.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904435000-7f9904635000 ---p 0002f000 08:02 402881184 /usr/lib64/libsystemd.so.0.6.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904635000-7f9904636000 r--p 0002f000 08:02 402881184 /usr/lib64/libsystemd.so.0.6.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904636000-7f9904637000 rw-p 00030000 08:02 402881184 /usr/lib64/libsystemd.so.0.6.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904637000-7f990463c000 r-xp 00000000 08:02 403081243 /usr/lib64/libXdmcp.so.6.0.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f990463c000-7f990483b000 ---p 00005000 08:02 403081243 /usr/lib64/libXdmcp.so.6.0.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f990483b000-7f990483c000 r--p 00004000 08:02 403081243 /usr/lib64/libXdmcp.so.6.0.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f990483c000-7f990483d000 rw-p 00005000 08:02 403081243 /usr/lib64/libXdmcp.so.6.0.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f990483d000-7f9904864000 r-xp 00000000 08:02 403086645 /usr/lib64/libxcb.so.1.1.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904864000-7f9904a63000 ---p 00027000 08:02 403086645 /usr/lib64/libxcb.so.1.1.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904a63000-7f9904a64000 r--p 00026000 08:02 403086645 /usr/lib64/libxcb.so.1.1.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904a64000-7f9904a65000 rw-p 00027000 08:02 403086645 /usr/lib64/libxcb.so.1.1.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904a65000-7f9904aa7000 r-xp 00000000 08:02 402985038 /usr/lib64/libaccountsservice.so.0.0.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904aa7000-7f9904ca7000 ---p 00042000 08:02 402985038 /usr/lib64/libaccountsservice.so.0.0.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904ca7000-7f9904cad000 r--p 00042000 08:02 402985038 /usr/lib64/libaccountsservice.so.0.0.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904cad000-7f9904cae000 rw-p 00048000 08:02 402985038 /usr/lib64/libaccountsservice.so.0.0.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904cae000-7f9904dc2000 r-xp 00000000 08:02 404973051 /usr/lib64/libglib-2.0.so.0.5600.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904dc2000-7f9904fc1000 ---p 00114000 08:02 404973051 /usr/lib64/libglib-2.0.so.0.5600.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904fc1000-7f9904fc2000 r--p 00113000 08:02 404973051 /usr/lib64/libglib-2.0.so.0.5600.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904fc2000-7f9904fc3000 rw-p 00114000 08:02 404973051 /usr/lib64/libglib-2.0.so.0.5600.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904fc3000-7f9904fc4000 rw-p 00000000 00:00 0 >Jul 05 15:17:55 m72e gdm[8000]: 7f9904fc4000-7f9905013000 r-xp 00000000 08:02 404999386 /usr/lib64/libgobject-2.0.so.0.5600.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f9905013000-7f9905212000 ---p 0004f000 08:02 404999386 /usr/lib64/libgobject-2.0.so.0.5600.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f9905212000-7f9905213000 r--p 0004e000 08:02 404999386 /usr/lib64/libgobject-2.0.so.0.5600.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f9905213000-7f9905214000 rw-p 0004f000 08:02 404999386 /usr/lib64/libgobject-2.0.so.0.5600.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f9905214000-7f99053a9000 r-xp 00000000 08:02 404784178 /usr/lib64/libgio-2.0.so.0.5600.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f99053a9000-7f99055a9000 ---p 00195000 08:02 404784178 /usr/lib64/libgio-2.0.so.0.5600.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f99055a9000-7f99055ae000 r--p 00195000 08:02 404784178 /usr/lib64/libgio-2.0.so.0.5600.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f99055ae000-7f99055b1000 rw-p 0019a000 08:02 404784178 /usr/lib64/libgio-2.0.so.0.5600.1 >Jul 05 15:17:55 m72e gdm[8000]: 7f99055b1000-7f99055b3000 rw-p 00000000 00:00 0 >Jul 05 15:17:55 m72e gdm[8000]: 7f99055b3000-7f99055b5000 r-xp 00000000 08:02 403081236 /usr/lib64/libXau.so.6.0.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f99055b5000-7f99057b5000 ---p 00002000 08:02 403081236 /usr/lib64/libXau.so.6.0.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f99057b5000-7f99057b6000 r--p 00002000 08:02 403081236 /usr/lib64/libXau.so.6.0.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f99057b6000-7f99057b7000 rw-p 00003000 08:02 403081236 /usr/lib64/libXau.so.6.0.0 >Jul 05 15:17:55 m72e gdm[8000]: 7f99057b7000-7f99057d9000 r-xp 00000000 08:02 402660745 /usr/lib64/ld-2.17.so >Jul 05 15:17:55 m72e gdm[8000]: 7f99059a5000-7f99059b6000 rw-p 00000000 00:00 0 >Jul 05 15:17:55 m72e gdm[8000]: 7f99059d4000-7f99059d8000 rw-p 00000000 00:00 0 >Jul 05 15:17:55 m72e gdm[8000]: 7f99059d8000-7f99059d9000 r--p 00021000 08:02 402660745 /usr/lib64/ld-2.17.so >Jul 05 15:17:55 m72e gdm[8000]: 7f99059d9000-7f99059da000 rw-p 00022000 08:02 402660745 /usr/lib64/ld-2.17.so >Jul 05 15:17:55 m72e gdm[8000]: 7f99059da000-7f99059db000 rw-p 00000000 00:00 0 >Jul 05 15:17:55 m72e gdm[8000]: 7ffecc02e000-7ffecc04f000 rw-p 00000000 00:00 0 [stack] >Jul 05 15:17:55 m72e gdm[8000]: 7ffecc081000-7ffecc083000 r-xp 00000000 00:00 0 [vdso] >Jul 05 15:17:55 m72e gdm[8000]: ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall] >Jul 05 15:17:55 m72e dbus[753]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Jul 05 15:17:55 m72e gnome-shell[8558]: JS ERROR: Failed to open reauthentication channel: Gio.DBusError: GDBus.Error:org.freedesktop.DBus.Error.NoReply: Message recipient disconnected from message bus without replying > _reauthenticationChannelOpened@resource:///org/gnome/shell/gdm/util.js:363:34 > wrapper@resource:///org/gnome/gjs/modules/_legacy.js:82:22 >Jul 05 15:17:55 m72e systemd[1]: gdm.service: main process exited, code=dumped, status=6/ABRT >Jul 05 15:17:55 m72e abrt-server[22721]: Duplicate: core backtrace >Jul 05 15:17:55 m72e abrt-server[22721]: DUP_OF_DIR: /var/spool/abrt/ccpp-2018-07-03-07:58:18-1313 >Jul 05 15:17:55 m72e abrt-server[22721]: Deleting problem directory ccpp-2018-07-05-15:17:54-8000 (dup of ccpp-2018-07-03-07:58:18-1313) >Jul 05 15:17:55 m72e kernel: rfkill: input handler enabled >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: App 'org.gnome.SettingsDaemon.Clipboard.desktop' exited with code 1 >Jul 05 15:17:55 m72e gsd-wacom[8718]: gsd-wacom: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e org.a11y.atspi.Registry[8525]: XIO: fatal IO error 11 (Resource temporarily unavailable) on X server ":0" >Jul 05 15:17:55 m72e org.a11y.atspi.Registry[8525]: after 36993 requests (36993 known processed) with 0 events remaining. >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: App 'org.gnome.SettingsDaemon.Clipboard.desktop' exited with code 1 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: App 'org.gnome.SettingsDaemon.Color.desktop' exited with code 1 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: App 'org.gnome.SettingsDaemon.Keyboard.desktop' exited with code 1 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 15:17:55 m72e sealertauto.desktop[9888]: seapplet: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: terminator: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e thunderbird.desktop[21441]: thunderbird: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: App 'org.gnome.SettingsDaemon.Color.desktop' exited with code 1 >Jul 05 15:17:55 m72e unknown[8692]: gsd-power: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e org.gtk.vfs.Daemon[8337]: A connection to the bus can't be made >Jul 05 15:17:55 m72e org.gnome.Shell.CalendarServer[8337]: gnome-shell-calendar-server[8611]: Lost (or failed to acquire) the name org.gnome.Shell.CalendarServer - exiting >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: App 'org.gnome.SettingsDaemon.Power.desktop' exited with code 1 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: App 'org.gnome.SettingsDaemon.XSettings.desktop' exited with code 1 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: App 'org.gnome.SettingsDaemon.Wacom.desktop' exited with code 1 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.PrintNotifications.desktop' killed by signal 15 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Rfkill.desktop' killed by signal 15 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.ScreensaverProxy.desktop' killed by signal 15 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Sharing.desktop' killed by signal 15 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Smartcard.desktop' killed by signal 15 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' killed by signal 15 >Jul 05 15:17:55 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: terminator: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: App 'org.gnome.SettingsDaemon.Keyboard.desktop' exited with code 1 >Jul 05 15:17:55 m72e unknown[8707]: gsd-xsettings: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e org.gtk.vfs.Daemon[8337]: A connection to the bus can't be made >Jul 05 15:17:55 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: terminator: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 15:17:55 m72e unknown[8737]: gsd-color: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e org.gtk.vfs.Daemon[8337]: A connection to the bus can't be made >Jul 05 15:17:55 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[8750]: terminator: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: App 'org.gnome.SettingsDaemon.Power.desktop' exited with code 1 >Jul 05 15:17:55 m72e unknown[8736]: gsd-clipboard: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: App 'org.gnome.SettingsDaemon.XSettings.desktop' exited with code 1 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Sound.desktop' killed by signal 15 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Datetime.desktop' killed by signal 15 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Housekeeping.desktop' killed by signal 15 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: App 'org.gnome.SettingsDaemon.MediaKeys.desktop' exited with code 1 >Jul 05 15:17:55 m72e gnome-session[8326]: gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 15:17:55 m72e unknown[8743]: gsd-keyboard: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: App 'org.gnome.SettingsDaemon.Wacom.desktop' exited with code 1 >Jul 05 15:17:55 m72e unknown[9892]: abrt: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.PrintNotifications.desktop' killed by signal 15 >Jul 05 15:17:55 m72e gnome-shell[8558]: gnome-shell: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Rfkill.desktop' killed by signal 15 >Jul 05 15:17:55 m72e unknown[8750]: gsd-media-keys: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.ScreensaverProxy.desktop' killed by signal 15 >Jul 05 15:17:55 m72e unknown[9891]: evolution-alarm-notify: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Sharing.desktop' killed by signal 15 >Jul 05 15:17:55 m72e unknown[9902]: rhsm-icon: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Smartcard.desktop' killed by signal 15 >Jul 05 15:17:55 m72e systemd[1]: Unit gdm.service entered failed state. >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' killed by signal 15 >Jul 05 15:17:55 m72e systemd[1]: Triggering OnFailure= dependencies of gdm.service. >Jul 05 15:17:55 m72e polkitd[771]: Unregistered Authentication Agent for unix-session:14 (system bus name :1.263, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) (disconnected from bus) >Jul 05 15:17:55 m72e systemd[1]: gdm.service failed. >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Sound.desktop' killed by signal 15 >Jul 05 15:17:55 m72e systemd[1]: Starting Terminate Plymouth Boot Screen... >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 15:17:55 m72e unknown[22730]: Cannot open display: >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Datetime.desktop' killed by signal 15 >Jul 05 15:17:55 m72e systemd[1]: Started Terminate Plymouth Boot Screen. >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Housekeeping.desktop' killed by signal 15 >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: App 'org.gnome.SettingsDaemon.MediaKeys.desktop' exited with code 1 >Jul 05 15:17:55 m72e gnome-session-binary[8326]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 15:17:55 m72e systemd[1]: gdm.service holdoff time over, scheduling restart. >Jul 05 15:17:55 m72e gdm-password][8290]: pam_unix(gdm-password:session): session closed for user whot >Jul 05 15:17:55 m72e systemd[1]: Stopped GNOME Display Manager. >Jul 05 15:17:55 m72e systemd[1]: Starting GNOME Display Manager... >Jul 05 15:17:55 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 15:17:55 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 15:17:55 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 15:17:55 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 15:17:55 m72e systemd[1]: Started GNOME Display Manager. >Jul 05 15:17:55 m72e abrt-server[22721]: Email address of sender was not specified. Would you like to do so now? If not, 'user@localhost' is to be used [y/N] >Jul 05 15:17:55 m72e abrt-server[22721]: Email address of receiver was not specified. Would you like to do so now? If not, 'root@localhost' is to be used [y/N] >Jul 05 15:17:55 m72e abrt-server[22721]: Sending an email... >Jul 05 15:17:55 m72e abrt-server[22721]: Sending a notification email to: root@localhost >Jul 05 15:17:55 m72e postfix/sendmail[22757]: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 15:17:55 m72e postfix/sendmail[22757]: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 15:17:55 m72e abrt-server[22721]: send-mail: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 15:17:55 m72e abrt-server[22721]: send-mail: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 15:17:55 m72e abrt-server[22721]: Error running '/bin/mailx' >Jul 05 15:17:55 m72e dbus[753]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Jul 05 15:17:56 m72e setroubleshoot[22720]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/sbin/gdm. For complete SELinux messages run: sealert -l a5294b69-64db-48f8-9f04-5919c22322c6 >Jul 05 15:17:56 m72e python[22720]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/sbin/gdm. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gdm file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 15:17:56 m72e systemd[1]: Created slice User Slice of gdm. >Jul 05 15:17:56 m72e systemd-logind[774]: New session c4 of user gdm. >Jul 05 15:17:56 m72e systemd[1]: Started Session c4 of user gdm. >Jul 05 15:17:56 m72e gdm-launch-environment][22777]: pam_unix(gdm-launch-environment:session): session opened for user gdm by whot(uid=0) >Jul 05 15:17:56 m72e setroubleshoot[22720]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/sbin/gdm. For complete SELinux messages run: sealert -l a5294b69-64db-48f8-9f04-5919c22322c6 >Jul 05 15:17:56 m72e python[22720]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/sbin/gdm. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gdm file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 15:17:56 m72e org.a11y.Bus[22790]: Activating service name='org.a11y.atspi.Registry' >Jul 05 15:17:56 m72e org.a11y.Bus[22790]: Successfully activated service 'org.a11y.atspi.Registry' >Jul 05 15:17:56 m72e org.a11y.atspi.Registry[22800]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry >Jul 05 15:17:56 m72e gnome-session[22783]: generating cookie with syscall >Jul 05 15:17:56 m72e gnome-session[22783]: generating cookie with syscall >Jul 05 15:17:56 m72e gnome-session[22783]: generating cookie with syscall >Jul 05 15:17:56 m72e gnome-session[22783]: generating cookie with syscall >Jul 05 15:17:56 m72e setroubleshoot[22720]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 15:17:56 m72e python[22720]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 15:17:56 m72e setroubleshoot[22720]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 15:17:56 m72e python[22720]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 15:17:56 m72e setroubleshoot[22720]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. For complete SELinux messages run: sealert -l c2670567-6ce1-42fd-bb01-7cdf552b3c40 >Jul 05 15:17:56 m72e python[22720]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that postdrop should be allowed map access on the postdrop file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'postdrop' --raw | audit2allow -M my-postdrop > # semodule -i my-postdrop.pp > >Jul 05 15:17:57 m72e rtkit-daemon[770]: Successfully made thread 22845 of process 22845 (/usr/bin/pulseaudio) owned by '42' high priority at nice level -11. >Jul 05 15:17:57 m72e rtkit-daemon[770]: Supervising 1 threads of 1 processes of 1 users. >Jul 05 15:17:57 m72e rtkit-daemon[770]: Supervising 1 threads of 1 processes of 1 users. >Jul 05 15:17:57 m72e rtkit-daemon[770]: Successfully made thread 22848 of process 22845 (/usr/bin/pulseaudio) owned by '42' RT at priority 5. >Jul 05 15:17:57 m72e rtkit-daemon[770]: Supervising 2 threads of 1 processes of 1 users. >Jul 05 15:17:57 m72e rtkit-daemon[770]: Supervising 2 threads of 1 processes of 1 users. >Jul 05 15:17:57 m72e rtkit-daemon[770]: Successfully made thread 22851 of process 22845 (/usr/bin/pulseaudio) owned by '42' RT at priority 5. >Jul 05 15:17:57 m72e rtkit-daemon[770]: Supervising 3 threads of 1 processes of 1 users. >Jul 05 15:17:57 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Jul 05 15:17:57 m72e systemd[1]: Starting Locale Service... >Jul 05 15:17:57 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.locale1' >Jul 05 15:17:57 m72e systemd[1]: Started Locale Service. >Jul 05 15:17:57 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' >Jul 05 15:17:57 m72e systemd[1]: Starting Location Lookup Service... >Jul 05 15:17:57 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.GeoClue2' >Jul 05 15:17:57 m72e systemd[1]: Started Location Lookup Service. >Jul 05 15:17:57 m72e polkitd[771]: Registered Authentication Agent for unix-session:c4 (system bus name :1.417 [/usr/bin/gnome-shell], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) >Jul 05 15:17:57 m72e spice-vdagent[22899]: Cannot access vdagent virtio channel /dev/virtio-ports/com.redhat.spice.0 >Jul 05 15:17:58 m72e gnome-session-binary[22783]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 15:17:58 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 15:17:58 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' >Jul 05 15:17:58 m72e systemd[1]: Starting Hostname Service... >Jul 05 15:17:58 m72e gnome-shell[22826]: Failed to load background 'file:///usr/share/backgrounds/gnome/adwaita-lock.jpg': Error opening file /usr/share/backgrounds/gnome/adwaita-lock.jpg: No such file or directory >Jul 05 15:17:58 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.hostname1' >Jul 05 15:17:58 m72e systemd[1]: Started Hostname Service. >Jul 05 15:17:58 m72e gnome-session-binary[22783]: Entering running state >Jul 05 15:17:58 m72e gnome-shell[22826]: Some code accessed the property 'AuthList' on the module 'authList'. That property was defined with 'let' or 'const' inside the module. This was previously supported, but is not correct according to the ES6 standard. Any symbols to be exported from a module must be defined with 'var'. The property access will work as previously for the time being, but please fix your code anyway. >Jul 05 15:17:58 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.realmd' unit='realmd.service' >Jul 05 15:17:58 m72e systemd[1]: Starting Realm and Domain Configuration... >Jul 05 15:17:58 m72e realmd[23002]: Loaded settings from: /usr/lib64/realmd/realmd-defaults.conf /usr/lib64/realmd/realmd-distro.conf >Jul 05 15:17:58 m72e realmd[23002]: holding daemon: startup >Jul 05 15:17:58 m72e realmd[23002]: starting service >Jul 05 15:17:58 m72e realmd[23002]: connected to bus >Jul 05 15:17:58 m72e realmd[23002]: released daemon: startup >Jul 05 15:17:58 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.realmd' >Jul 05 15:17:58 m72e realmd[23002]: claimed name on bus: org.freedesktop.realmd >Jul 05 15:17:58 m72e systemd[1]: Started Realm and Domain Configuration. >Jul 05 15:17:58 m72e org.gnome.Shell.desktop[22826]: Window manager warning: "XF86RFKill" is not a valid accelerator >Jul 05 15:17:58 m72e gnome-shell[22826]: Error looking up permission: GDBus.Error:org.freedesktop.portal.Error.NotFound: No entry for geolocation >Jul 05 15:17:58 m72e gnome-shell[22826]: JS WARNING: [resource:///org/gnome/shell/ui/layout.js 29]: reference to undefined property "MetaWindowX11" >Jul 05 15:17:58 m72e setroubleshoot[22720]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. For complete SELinux messages run: sealert -l 878583e9-e1dd-462e-a486-e30159ea9944 >Jul 05 15:17:58 m72e python[22720]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that gnome-shell should be allowed map access on the hwdb.bin file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell > # semodule -i my-gnomeshell.pp > >Jul 05 15:18:01 m72e setroubleshoot[22720]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. For complete SELinux messages run: sealert -l 878583e9-e1dd-462e-a486-e30159ea9944 >Jul 05 15:18:01 m72e python[22720]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that gnome-shell should be allowed map access on the hwdb.bin file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell > # semodule -i my-gnomeshell.pp > >Jul 05 15:18:02 m72e setroubleshoot[22720]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. For complete SELinux messages run: sealert -l 878583e9-e1dd-462e-a486-e30159ea9944 >Jul 05 15:18:02 m72e systemd-logind[774]: New session 57 of user whot. >Jul 05 15:18:02 m72e python[22720]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that gnome-shell should be allowed map access on the hwdb.bin file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell > # semodule -i my-gnomeshell.pp > >Jul 05 15:18:02 m72e systemd[1]: Started Session 57 of user whot. >Jul 05 15:18:02 m72e gdm-password][23027]: pam_unix(gdm-password:session): session opened for user whot by whot(uid=0) >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.XSettings.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.XSettings.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Clipboard.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Datetime.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Housekeeping.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Keyboard.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Power.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.PrintNotifications.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Rfkill.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.ScreensaverProxy.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Sharing.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Smartcard.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Sound.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Wacom.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 15:18:04 m72e at-spi2-registr[22805]: Failed to send session response The connection is closed >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Clipboard.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Color.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.MediaKeys.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session[22783]: gnome-session-binary[22783]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 15:18:04 m72e ibus-portal[22873]: Error releasing name org.freedesktop.portal.IBus: The connection is closed >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Datetime.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Housekeeping.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Keyboard.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Power.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.PrintNotifications.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Rfkill.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.ScreensaverProxy.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Sharing.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Smartcard.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Sound.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Wacom.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.Color.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Application 'org.gnome.SettingsDaemon.MediaKeys.desktop' killed by signal 15 >Jul 05 15:18:04 m72e gnome-session-binary[22783]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 15:18:04 m72e polkitd[771]: Unregistered Authentication Agent for unix-session:c4 (system bus name :1.417, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) (disconnected from bus) >Jul 05 15:18:04 m72e gnome-session-f[23064]: Cannot open display: >Jul 05 15:18:04 m72e gdm-password][23066]: unable to log session >Jul 05 15:18:05 m72e com.redhat.imsettings[23076]: [ 1530767885.018912]: IMSettings-Daemon[23145]: INFO: Starting imsettings-daemon... >Jul 05 15:18:05 m72e com.redhat.imsettings[23076]: [ 1530767885.019044]: IMSettings-Daemon[23145]: INFO: [HOME=/home/whot/.config/imsettings] >Jul 05 15:18:05 m72e com.redhat.imsettings[23076]: [ 1530767885.019088]: IMSettings-Daemon[23145]: INFO: [XINPUTRCDIR=/etc/X11/xinit/] >Jul 05 15:18:05 m72e com.redhat.imsettings[23076]: [ 1530767885.019126]: IMSettings-Daemon[23145]: INFO: [XINPUTDIR=/etc/X11/xinit/xinput.d/] >Jul 05 15:18:05 m72e com.redhat.imsettings[23076]: [ 1530767885.019162]: IMSettings-Daemon[23145]: INFO: [MODULEDIR=/usr/lib64/imsettings] >Jul 05 15:18:05 m72e com.redhat.imsettings[23076]: [ 1530767885.019200]: IMSettings-Daemon[23145]: INFO: [MODULES=gsettings, qt] >Jul 05 15:18:05 m72e org.a11y.Bus[23076]: Activating service name='org.a11y.atspi.Registry' >Jul 05 15:18:05 m72e org.a11y.Bus[23076]: Successfully activated service 'org.a11y.atspi.Registry' >Jul 05 15:18:05 m72e org.a11y.atspi.Registry[23261]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry >Jul 05 15:18:05 m72e gnome-session[23066]: generating cookie with syscall >Jul 05 15:18:05 m72e gnome-session[23066]: generating cookie with syscall >Jul 05 15:18:05 m72e gnome-session[23066]: generating cookie with syscall >Jul 05 15:18:05 m72e gnome-session[23066]: generating cookie with syscall >Jul 05 15:18:05 m72e gnome-keyring-daemon[23044]: Gkm: using old keyring directory: /home/whot/.gnome2/keyrings >Jul 05 15:18:05 m72e gnome-keyring-daemon[23044]: Gkm: using old keyring directory: /home/whot/.gnome2/keyrings >Jul 05 15:18:05 m72e gnome-keyring-ssh.desktop[23286]: SSH_AUTH_SOCK=/run/user/13349/keyring/ssh >Jul 05 15:18:05 m72e gnome-keyring-secrets.desktop[23285]: SSH_AUTH_SOCK=/run/user/13349/keyring/ssh >Jul 05 15:18:05 m72e rtkit-daemon[770]: Successfully made thread 23304 of process 23304 (/usr/bin/pulseaudio) owned by '13349' high priority at nice level -11. >Jul 05 15:18:05 m72e rtkit-daemon[770]: Supervising 4 threads of 2 processes of 2 users. >Jul 05 15:18:05 m72e pulseaudio[23304]: [pulseaudio] pid.c: Stale PID file, overwriting. >Jul 05 15:18:06 m72e rtkit-daemon[770]: Supervising 4 threads of 2 processes of 2 users. >Jul 05 15:18:06 m72e rtkit-daemon[770]: Successfully made thread 23307 of process 23304 (/usr/bin/pulseaudio) owned by '13349' RT at priority 5. >Jul 05 15:18:06 m72e rtkit-daemon[770]: Supervising 5 threads of 2 processes of 2 users. >Jul 05 15:18:06 m72e rtkit-daemon[770]: Supervising 5 threads of 2 processes of 2 users. >Jul 05 15:18:06 m72e rtkit-daemon[770]: Successfully made thread 23310 of process 23304 (/usr/bin/pulseaudio) owned by '13349' RT at priority 5. >Jul 05 15:18:06 m72e rtkit-daemon[770]: Supervising 6 threads of 2 processes of 2 users. >Jul 05 15:18:06 m72e dbus[753]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' >Jul 05 15:18:06 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' >Jul 05 15:18:06 m72e systemd[1]: Starting Location Lookup Service... >Jul 05 15:18:06 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.GeoClue2' >Jul 05 15:18:06 m72e systemd[1]: Started Location Lookup Service. >Jul 05 15:18:06 m72e polkitd[771]: Registered Authentication Agent for unix-session:57 (system bus name :1.443 [/usr/bin/gnome-shell], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) >Jul 05 15:18:06 m72e goa-daemon[23375]: goa-daemon version 3.28.0 starting >Jul 05 15:18:07 m72e goa-identity-se[23388]: GoaKerberosIdentityManager: Using polling for change notification for credential cache type 'KEYRING' >Jul 05 15:18:07 m72e org.gtk.vfs.AfcVolumeMonitor[23076]: Volume monitor alive >Jul 05 15:18:07 m72e spice-vdagent[23454]: Cannot access vdagent virtio channel /dev/virtio-ports/com.redhat.spice.0 >Jul 05 15:18:07 m72e gnome-shell[23294]: Some code accessed the property '_modes' on the module 'sessionMode'. That property was defined with 'let' or 'const' inside the module. This was previously supported, but is not correct according to the ES6 standard. Any symbols to be exported from a module must be defined with 'var'. The property access will work as previously for the time being, but please fix your code anyway. >Jul 05 15:18:07 m72e gnome-session-binary[23066]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 15:18:07 m72e gsd-account[23424]: Settings schema 'org.gnome.settings-daemon.plugins.account' is not installed >Jul 05 15:18:07 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 15:18:07 m72e kernel: traps: gsd-account[23424] trap int3 ip:7fb3dbec5b11 sp:7ffe57116fd0 error:0 >Jul 05 15:18:07 m72e gsd-housekeepin[23479]: Loading NVML: libnvidia-ml.so: cannot open shared object file: No such file or directory >Jul 05 15:18:07 m72e gsd-xsettings[23441]: Failed to get current display configuration state: GDBus.Error:org.freedesktop.DBus.Error.NameHasNoOwner: Name "org.gnome.Mutter.DisplayConfig" does not exist >Jul 05 15:18:07 m72e kernel: rfkill: input handler disabled >Jul 05 15:18:07 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.NetworkManager' unit='dbus-org.freedesktop.NetworkManager.service' >Jul 05 15:18:07 m72e dbus[753]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.NetworkManager.service': Unit not found. >Jul 05 15:18:07 m72e gsd-rfkill[23431]: Failed to acquire NetworkManager proxy: Error calling StartServiceByName for org.freedesktop.NetworkManager: GDBus.Error:org.freedesktop.systemd1.NoSuchUnit: Unit not found. >Jul 05 15:18:07 m72e abrt-hook-ccpp[23494]: Process 23424 (gsd-account) of user 13349 killed by SIGTRAP - dumping core >Jul 05 15:18:07 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc: Permission denied >Jul 05 15:18:07 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc: Permission denied >Jul 05 15:18:07 m72e setroubleshoot[22720]: SELinux is preventing /usr/libexec/gdm-session-worker from 'read, append' accesses on the file session.log. For complete SELinux messages run: sealert -l 508ab26c-ffb6-4759-84e1-90e0199490bb >Jul 05 15:18:07 m72e gsd-color[23475]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc: Permission denied >Jul 05 15:18:07 m72e gsd-color[23475]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc: Permission denied >Jul 05 15:18:07 m72e python[22720]: SELinux is preventing /usr/libexec/gdm-session-worker from 'read, append' accesses on the file session.log. > > ***** Plugin catchall_labels (83.8 confidence) suggests ******************* > > If you want to allow gdm-session-worker to have read append access on the session.log file > Then you need to change the label on session.log > Do > # semanage fcontext -a -t FILE_TYPE 'session.log' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, admin_crontab_tmp_t, alsa_tmp_t, amanda_tmp_t, anon_inodefs_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, auditadm_sudo_tmp_t, auth_cache_t, auth_home_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cgroup_t, chrome_sandbox_tmp_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_tmp_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_tmp_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_runtime_tmp_t, couchdb_tmp_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_lpd_tmp_t, cupsd_tmp_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, etc_runtime_t, exim_tmp_t, fail2ban_tmp_t, faillog_t, fenced_tmp_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, initrc_var_run_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, iscsi_tmp_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, lastlog_t, ldconfig_tmp_t, livecd_tmp_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_tmp_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, netutils_tmp_t, neutron_tmp_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, pam_var_console_t, pam_var_run_t, passenger_tmp_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_tmp_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_tmp_t, prelude_lml_tmp_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rsync_tmp_t, rtas_errd_tmp_t, samba_net_tmp_t, sbd_tmpfs_t, sblim_tmp_t, secadm_sudo_tmp_t, sectool_tmp_t, security_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, ssh_agent_tmp_t, ssh_keygen_tmp_t, ssh_tmpfs_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_cronjob_tmp_t, system_dbusd_tmp_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_passwd_var_run_t, targetd_tmp_t, tcpd_tmp_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_tmp_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, tgtd_tmp_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, user_cron_spool_t, user_fonts_t, user_mail_tmp_t, user_tmp_t, uucpd_tmp_t, var_auth_t, var_spool_t, varnishd_tmp_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmtools_tmp_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wireshark_tmp_t, wireshark_tmpfs_t, wtmp_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_lock_t, xdm_log_t, xdm_rw_etc_t, xdm_spool_t, xdm_tmpfs_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenstored_tmp_t, xkb_var_lib_t, xserver_log_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t. > Then execute: > restorecon -v 'session.log' > > > ***** Plugin catchall (17.1 confidence) suggests ************************** > > If you believe that gdm-session-worker should be allowed read append access on the session.log file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdm-session-wor' --raw | audit2allow -M my-gdmsessionwor > # semodule -i my-gdmsessionwor.pp > >Jul 05 15:18:07 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc: Permission denied >Jul 05 15:18:07 m72e gsd-color[23475]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc: Permission denied >Jul 05 15:18:07 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 15:18:07 m72e gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 15:18:07 m72e gsd-media-keys[23485]: g_variant_get_va: assertion 'value != NULL' failed >Jul 05 15:18:07 m72e kernel: traps: gsd-account[23544] trap int3 ip:7efcc7676b11 sp:7ffce9eb2ae0 error:0 >Jul 05 15:18:07 m72e gsd-media-keys[23485]: g_variant_unref: assertion 'value != NULL' failed >Jul 05 15:18:07 m72e gsd-account[23544]: Settings schema 'org.gnome.settings-daemon.plugins.account' is not installed >Jul 05 15:18:07 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc: Permission denied >Jul 05 15:18:07 m72e gsd-color[23475]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc: Permission denied >Jul 05 15:18:07 m72e abrt-hook-ccpp[23549]: Process 23544 (gsd-account) of user 13349 killed by SIGTRAP - ignoring (repeated crash) >Jul 05 15:18:07 m72e gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 15:18:07 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 15:18:07 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: App 'org.gnome.SettingsDaemon.Account.desktop' respawning too quickly >Jul 05 15:18:08 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: Error on restarting session managed app: Component 'org.gnome.SettingsDaemon.Account.desktop' crashing too quickly >Jul 05 15:18:07 m72e gnome-session-binary[23066]: WARNING: App 'org.gnome.SettingsDaemon.Account.desktop' respawning too quickly >Jul 05 15:18:07 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc: Permission denied >Jul 05 15:18:07 m72e gnome-session-binary[23066]: WARNING: Error on restarting session managed app: Component 'org.gnome.SettingsDaemon.Account.desktop' crashing too quickly >Jul 05 15:18:08 m72e gsd-color[23475]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc: Permission denied >Jul 05 15:18:08 m72e gnome-shell[23294]: JS WARNING: [resource:///org/gnome/shell/ui/workspaceThumbnail.js 887]: reference to undefined property "_switchWorkspaceNotifyId" >Jul 05 15:18:08 m72e abrt-server[23543]: Duplicate: core backtrace >Jul 05 15:18:08 m72e abrt-server[23543]: DUP_OF_DIR: /var/spool/abrt/ccpp-2018-07-02-09:55:59-10206 >Jul 05 15:18:08 m72e abrt-server[23543]: Deleting problem directory ccpp-2018-07-05-15:18:07-23424 (dup of ccpp-2018-07-02-09:55:59-10206) >Jul 05 15:18:08 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 15:18:08 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 15:18:08 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 15:18:08 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 15:18:08 m72e abrt-server[23543]: Email address of sender was not specified. Would you like to do so now? If not, 'user@localhost' is to be used [y/N] >Jul 05 15:18:08 m72e abrt-server[23543]: Email address of receiver was not specified. Would you like to do so now? If not, 'root@localhost' is to be used [y/N] >Jul 05 15:18:08 m72e abrt-server[23543]: Sending an email... >Jul 05 15:18:08 m72e abrt-server[23543]: Sending a notification email to: root@localhost >Jul 05 15:18:08 m72e postfix/sendmail[23565]: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 15:18:08 m72e abrt-server[23543]: send-mail: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 15:18:08 m72e abrt-server[23543]: send-mail: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 15:18:08 m72e postfix/sendmail[23565]: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 15:18:08 m72e abrt-server[23543]: Error running '/bin/mailx' >Jul 05 15:18:08 m72e setroubleshoot[22720]: SELinux is preventing /usr/libexec/gdm-session-worker from write access on the directory gdm. For complete SELinux messages run: sealert -l 62b4a3f6-9761-4f8f-9235-10f811608807 >Jul 05 15:18:08 m72e python[22720]: SELinux is preventing /usr/libexec/gdm-session-worker from write access on the directory gdm. > > ***** Plugin catchall_labels (83.8 confidence) suggests ******************* > > If you want to allow gdm-session-worker to have write access on the gdm directory > Then you need to change the label on gdm > Do > # semanage fcontext -a -t FILE_TYPE 'gdm' > where FILE_TYPE is one of the following: abrt_var_cache_t, admin_home_t, alsa_home_t, antivirus_home_t, audio_home_t, auth_cache_t, auth_home_t, cache_home_t, cgroup_t, chrome_sandbox_home_t, config_home_t, container_home_t, cvs_home_t, data_home_t, dbus_home_t, etc_t, faillog_t, fetchmail_home_t, fonts_cache_t, gconf_home_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, gnome_home_t, gpg_secret_t, gstreamer_home_t, home_bin_t, home_cert_t, httpd_user_content_t, httpd_user_script_exec_t, icc_data_home_t, iceauth_home_t, init_var_run_t, irc_home_t, irc_tmp_t, irssi_home_t, kismet_home_t, krb5_home_t, krb5_host_rcache_t, local_login_home_t, locale_t, mail_home_rw_t, mail_home_t, mandb_home_t, mozilla_home_t, mozilla_plugin_rw_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mpd_home_t, mpd_user_data_t, mplayer_home_t, mysqld_home_t, openshift_var_lib_t, pam_var_console_t, pam_var_run_t, polipo_cache_home_t, polipo_config_home_t, procmail_home_t, pulseaudio_home_t, rlogind_home_t, root_t, rssh_ro_t, rssh_rw_t, sandbox_file_t, screen_home_t, spamc_home_t, speech-dispatcher_home_t, ssh_home_t, svirt_home_t, systemd_home_t, systemd_passwd_var_run_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_sunshine_home_t, texlive_home_t, thumb_home_t, tmp_t, tmpfs_t, tvtime_home_t, uml_ro_t, uml_rw_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_dir_t, user_home_t, user_tmp_t, usr_t, var_auth_t, var_lib_t, var_lock_t, var_log_t, var_run_t, var_spool_t, var_t, virt_content_t, virt_home_t, vmware_conf_t, vmware_file_t, wine_home_t, wireshark_home_t, xauth_home_t, xdm_home_t, xdm_log_t, xdm_rw_etc_t, xdm_spool_t, xdm_tmpfs_t, xdm_var_lib_t, xdm_var_run_t, xkb_var_lib_t, xserver_log_t. > Then execute: > restorecon -v 'gdm' > > > ***** Plugin catchall (17.1 confidence) suggests ************************** > > If you believe that gdm-session-worker should be allowed write access on the gdm directory by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdm-session-wor' --raw | audit2allow -M my-gdmsessionwor > # semodule -i my-gdmsessionwor.pp > >Jul 05 15:18:08 m72e gnome-shell[23294]: Failed to load background 'file:///usr/share/backgrounds/gnome/adwaita-lock.jpg': Error opening file /usr/share/backgrounds/gnome/adwaita-lock.jpg: No such file or directory >Jul 05 15:18:08 m72e setroubleshoot[22720]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 15:18:08 m72e python[22720]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-0bac1383fb4abc86437df0bfd31023b9.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-0bac1383fb4abc86437df0bfd31023b9.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 15:18:08 m72e setroubleshoot[22720]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 15:18:08 m72e python[22720]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-0c2d933e282feb5e95379b2caa320512.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-0c2d933e282feb5e95379b2caa320512.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 15:18:08 m72e gnome-shell[23294]: Error looking up permission: GDBus.Error:org.freedesktop.portal.Error.NotFound: No entry for geolocation >Jul 05 15:18:08 m72e setroubleshoot[22720]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 15:18:08 m72e python[22720]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-425bbe74e56050940c54b0f2931c5aec.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-425bbe74e56050940c54b0f2931c5aec.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 15:18:09 m72e setroubleshoot[22720]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 15:18:09 m72e python[22720]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-9d03684165204e087fc5b6a268ff58f2.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-9d03684165204e087fc5b6a268ff58f2.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 15:18:09 m72e setroubleshoot[22720]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 15:18:09 m72e python[22720]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 15:18:09 m72e gnome-shell[23294]: GNOME Shell started at Thu Jul 05 2018 15:18:07 GMT+1000 (AEST) >Jul 05 15:18:09 m72e setroubleshoot[22720]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. For complete SELinux messages run: sealert -l 6669b36f-d550-4692-840a-03526ca0d447 >Jul 05 15:18:09 m72e python[22720]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gsd-account file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 15:18:09 m72e setroubleshoot[22720]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. For complete SELinux messages run: sealert -l 6669b36f-d550-4692-840a-03526ca0d447 >Jul 05 15:18:09 m72e python[22720]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gsd-account file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 15:18:09 m72e org.gnome.Shell.desktop[23294]: Window manager warning: "XF86RFKill" is not a valid accelerator >Jul 05 15:18:09 m72e setroubleshoot[22720]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 15:18:09 m72e python[22720]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 15:18:09 m72e setroubleshoot[22720]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 15:18:09 m72e python[22720]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 15:18:11 m72e setroubleshoot[22720]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. For complete SELinux messages run: sealert -l c2670567-6ce1-42fd-bb01-7cdf552b3c40 >Jul 05 15:18:11 m72e python[22720]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that postdrop should be allowed map access on the postdrop file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'postdrop' --raw | audit2allow -M my-postdrop > # semodule -i my-postdrop.pp > >Jul 05 15:18:12 m72e telepathy-haze[23390]: Exiting >Jul 05 15:18:24 m72e systemd-logind[774]: Removed session c4. >Jul 05 15:18:24 m72e systemd[1]: Removed slice User Slice of gdm. >Jul 05 15:18:31 m72e dbus[753]: [system] Failed to activate service 'org.bluez': timed out >Jul 05 15:18:31 m72e pulseaudio[23304]: [pulseaudio] bluez5-util.c: GetManagedObjects() failed: org.freedesktop.DBus.Error.NoReply: Did not receive a reply. Possible causes include: the remote application did not send a reply, the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken. >Jul 05 15:18:59 m72e realmd[23002]: quitting realmd service after timeout >Jul 05 15:18:59 m72e realmd[23002]: stopping service >Jul 05 15:19:11 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[23485]: Unable to bind hide_window key, another instance/window has it. >Jul 05 15:19:11 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[23485]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 15:19:11 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[23485]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 15:19:11 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[23485]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 15:19:22 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[23485]: Unable to bind hide_window key, another instance/window has it. >Jul 05 15:19:23 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[23485]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 15:19:23 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[23485]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 15:19:23 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[23485]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 15:19:37 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' failed to register before timeout >Jul 05 15:19:37 m72e gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' failed to register before timeout >Jul 05 15:19:37 m72e vmware-user.desktop[23826]: vmware-user: could not open /proc/fs/vmblock/dev >Jul 05 15:19:37 m72e gnome-session-binary[23066]: Entering running state >Jul 05 15:19:37 m72e com.redhat.imsettings[23076]: [ 1530767977.774248]: IMSettings-Daemon[23145]: INFO: Attempting to switch IM to none [lang=en_AU.utf8, update=false] >Jul 05 15:19:37 m72e libcanberra-login-sound.desktop[23830]: Failed to play sound: File or data not found >Jul 05 15:19:37 m72e gnome-shell[23294]: STACK_OP_ADD: window 0x2e00001 already in stack >Jul 05 15:19:37 m72e gnome-shell[23294]: STACK_OP_ADD: window 0x2e00001 already in stack >Jul 05 15:19:37 m72e com.redhat.imsettings[23076]: No such schema âorg.gnome.settings-daemon.plugins.keyboardâ >Jul 05 15:19:37 m72e com.redhat.imsettings[23076]: [ 1530767977.911927]: IMSettings-Daemon[23145]: WARNING **: Current desktop isn't targeted by IMSettings. >Jul 05 15:19:37 m72e imsettings-start.desktop[23824]: GDBus.Error:org.gtk.GDBus.UnmappedGError.Quark._imsettings_2derror_2dquark.Code5: Current desktop isn't targeted by IMSettings. >Jul 05 15:19:37 m72e com.redhat.imsettings[23076]: Exiting... >Jul 05 15:19:37 m72e com.redhat.imsettings[23076]: [ 1530767977.917966]: IMSettings-Daemon[23145]: INFO: Unloading imesttings module: qt >Jul 05 15:19:37 m72e com.redhat.imsettings[23076]: [ 1530767977.918117]: IMSettings-Daemon[23145]: INFO: Unloading imesttings module: gsettings >Jul 05 15:19:37 m72e com.redhat.imsettings[23076]: [ 1530767977.918185]: IMSettings-Daemon[23145]: INFO: imsettings-daemon is shut down. >Jul 05 15:19:38 m72e gnome-shell[23294]: JS WARNING: [/usr/share/gnome-shell/extensions/top-icons@gnome-shell-extensions.gcampax.github.com/extension.js 118]: reference to undefined property "width" >Jul 05 15:19:38 m72e gnome-software[23817]: enabled plugins: desktop-categories, packagekit-local, packagekit-offline, packagekit-proxy, packagekit-refresh, packagekit-upgrade, packagekit, shell-extensions, systemd-updates, packagekit-url-to-app, fwupd, os-release, appstream, steam, desktop-menu-path, flatpak, hardcoded-blacklist, hardcoded-featured, hardcoded-popular, modalias, packagekit-refine, generic-updates, rewrite-resource, icons, odrs, packagekit-history, provenance, repos, key-colors, provenance-license, packagekit-refine-repos, key-colors-metadata >Jul 05 15:19:38 m72e gnome-software[23817]: disabled plugins: dpkg, dummy, fedora-pkgdb-collections, epiphany >Jul 05 15:19:38 m72e gnome-software[23817]: failed to call gs_plugin_add_updates_historical on packagekit-offline: cannot find repo mhlavink-developerdashboard >Jul 05 15:19:42 m72e PackageKit[1849]: get-updates transaction /2386_dccadcba from uid 13349 finished with success after 4465ms >Jul 05 15:19:42 m72e gnome-software[23817]: hiding category audio-video featured applications: found only 0 to show, need at least 9 >Jul 05 15:19:42 m72e gnome-software[23817]: hiding category games featured applications: found only 0 to show, need at least 9 >Jul 05 15:19:42 m72e gnome-software[23817]: top-icons@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 15:19:42 m72e gnome-software[23817]: apps-menu@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 15:19:42 m72e gnome-software[23817]: window-list@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 15:19:42 m72e gnome-software[23817]: launch-new-instance@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 15:19:42 m72e gnome-software[23817]: places-menu@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 15:19:42 m72e gnome-software[23817]: alternate-tab@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 15:19:44 m72e PackageKit[1849]: resolve transaction /2387_ecbabbdd from uid 13349 finished with success after 966ms >Jul 05 15:19:44 m72e PackageKit[1849]: resolve transaction /2388_caccaeca from uid 13349 finished with success after 53ms >Jul 05 15:19:44 m72e PackageKit[1849]: resolve transaction /2389_babdddaa from uid 13349 finished with success after 37ms >Jul 05 15:19:44 m72e gnome-software[23817]: Only 5 apps for popular list, hiding >Jul 05 15:19:44 m72e PackageKit[1849]: resolve transaction /2390_cdbcccbe from uid 13349 finished with success after 96ms >Jul 05 15:19:44 m72e PackageKit[1849]: resolve transaction /2391_edaeaedd from uid 13349 finished with success after 136ms >Jul 05 15:19:46 m72e PackageKit[1849]: get-update-detail transaction /2392_cedaaded from uid 13349 finished with success after 2109ms >Jul 05 15:19:46 m72e PackageKit[1849]: search-file transaction /2393_ddeecaaa from uid 13349 finished with success after 14ms >Jul 05 15:19:46 m72e gnome-software[23817]: Failed to find one package for vmware-player.desktop, /usr/share/applications/vmware-player.desktop, [0] >Jul 05 15:19:46 m72e PackageKit[1849]: search-file transaction /2394_adeecebd from uid 13349 finished with success after 48ms >Jul 05 15:19:46 m72e PackageKit[1849]: search-file transaction /2395_caeabeee from uid 13349 finished with success after 47ms >Jul 05 15:19:46 m72e PackageKit[1849]: search-file transaction /2396_cedbacad from uid 13349 finished with success after 47ms >Jul 05 15:19:47 m72e PackageKit[1849]: search-file transaction /2397_ccabcebc from uid 13349 finished with success after 47ms >Jul 05 15:19:47 m72e PackageKit[1849]: search-file transaction /2398_acaebbcc from uid 13349 finished with success after 47ms >Jul 05 15:19:47 m72e PackageKit[1849]: search-file transaction /2399_abdbbece from uid 13349 finished with success after 47ms >Jul 05 15:19:47 m72e PackageKit[1849]: search-file transaction /2400_baccdbac from uid 13349 finished with success after 46ms >Jul 05 15:19:47 m72e PackageKit[1849]: search-file transaction /2401_dbcedaee from uid 13349 finished with success after 47ms >Jul 05 15:19:47 m72e PackageKit[1849]: search-file transaction /2402_ebdaceec from uid 13349 finished with success after 46ms >Jul 05 15:19:47 m72e PackageKit[1849]: search-file transaction /2403_eacdacda from uid 13349 finished with success after 47ms >Jul 05 15:19:47 m72e PackageKit[1849]: search-file transaction /2404_dcededdd from uid 13349 finished with success after 46ms >Jul 05 15:19:47 m72e PackageKit[1849]: search-file transaction /2405_caebaecd from uid 13349 finished with success after 47ms >Jul 05 15:19:48 m72e PackageKit[1849]: search-file transaction /2406_ceecbbea from uid 13349 finished with success after 47ms >Jul 05 15:19:48 m72e PackageKit[1849]: search-file transaction /2407_abaadabe from uid 13349 finished with success after 47ms >Jul 05 15:19:48 m72e PackageKit[1849]: search-file transaction /2408_eebaeebe from uid 13349 finished with success after 46ms >Jul 05 15:19:48 m72e PackageKit[1849]: search-file transaction /2409_dcdacade from uid 13349 finished with success after 46ms >Jul 05 15:19:48 m72e PackageKit[1849]: search-file transaction /2410_ccbcabdc from uid 13349 finished with success after 47ms >Jul 05 15:19:48 m72e PackageKit[1849]: search-file transaction /2411_dedbcacc from uid 13349 finished with success after 47ms >Jul 05 15:19:48 m72e PackageKit[1849]: search-file transaction /2412_decbbced from uid 13349 finished with success after 47ms >Jul 05 15:19:48 m72e PackageKit[1849]: get-details transaction /2413_edeebacd from uid 13349 finished with success after 102ms >Jul 05 15:19:57 m72e gnome-shell[23294]: JS WARNING: [resource:///org/gnome/shell/ui/popupMenu.js 717]: reference to undefined property "_delegate" >Jul 05 15:19:58 m72e dbus[753]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Jul 05 15:19:58 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:11] Failed to parse protect system value, ignoring: strict >Jul 05 15:19:58 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:12] Unknown lvalue 'ProtectKernelTunables' in section 'Service' >Jul 05 15:19:58 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:13] Unknown lvalue 'ProtectControlGroups' in section 'Service' >Jul 05 15:19:58 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:14] Unknown lvalue 'ReadWritePaths' in section 'Service' >Jul 05 15:19:58 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:23] Unknown lvalue 'MemoryDenyWriteExecute' in section 'Service' >Jul 05 15:19:58 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:26] Unknown lvalue 'ProtectKernelModules' in section 'Service' >Jul 05 15:19:58 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:29] Unknown lvalue 'RestrictRealtime' in section 'Service' >Jul 05 15:19:58 m72e systemd[1]: Starting Fingerprint Authentication Daemon... >Jul 05 15:19:58 m72e dbus[753]: [system] Successfully activated service 'net.reactivated.Fprint' >Jul 05 15:19:58 m72e systemd[1]: Started Fingerprint Authentication Daemon. >Jul 05 15:19:58 m72e gnome-shell[23294]: Some code accessed the property 'AuthList' on the module 'authList'. That property was defined with 'let' or 'const' inside the module. This was previously supported, but is not correct according to the ES6 standard. Any symbols to be exported from a module must be defined with 'var'. The property access will work as previously for the time being, but please fix your code anyway. >Jul 05 15:20:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 15:20:01 m72e systemd[1]: Started Session 58 of user root. >Jul 05 15:20:01 m72e CROND[24011]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 15:20:01 m72e gdm-password][24002]: gkr-pam: unlocked login keyring >Jul 05 15:20:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 15:20:01 m72e gdm[22741]: *** Error in `/usr/sbin/gdm': double free or corruption (fasttop): 0x000055e4534463f0 *** >Jul 05 15:20:01 m72e gdm[22741]: ======= Backtrace: ========= >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libc.so.6(+0x81489)[0x7f5a86b58489] >Jul 05 15:20:01 m72e gdm[22741]: /usr/sbin/gdm(+0x1a552)[0x55e4523d4552] >Jul 05 15:20:01 m72e gdm[22741]: /usr/sbin/gdm(+0x1a653)[0x55e4523d4653] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libgobject-2.0.so.0(g_cclosure_marshal_VOID__STRINGv+0x99)[0x7f5a87c90899] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libgobject-2.0.so.0(+0xfbb7)[0x7f5a87c8dbb7] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libgobject-2.0.so.0(g_signal_emit_valist+0x477)[0x7f5a87ca7657] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libgobject-2.0.so.0(g_signal_emit+0x8f)[0x7f5a87ca82df] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libffi.so.6(ffi_call_unix64+0x4c)[0x7f5a868d4dcc] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libffi.so.6(ffi_call+0x1f5)[0x7f5a868d46f5] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libgobject-2.0.so.0(g_cclosure_marshal_generic+0x1f8)[0x7f5a87c8e1c8] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libgobject-2.0.so.0(g_closure_invoke+0x138)[0x7f5a87c8d988] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libgobject-2.0.so.0(+0x2205d)[0x7f5a87ca005d] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libgobject-2.0.so.0(g_signal_emitv+0x231)[0x7f5a87ca7171] >Jul 05 15:20:01 m72e gdm[22741]: /usr/sbin/gdm(+0x3e803)[0x55e4523f8803] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libffi.so.6(ffi_call_unix64+0x4c)[0x7f5a868d4dcc] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libffi.so.6(ffi_call+0x1f5)[0x7f5a868d46f5] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libgobject-2.0.so.0(g_cclosure_marshal_generic+0x1f8)[0x7f5a87c8e1c8] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libgobject-2.0.so.0(g_closure_invoke+0x138)[0x7f5a87c8d988] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libgobject-2.0.so.0(+0x21e1b)[0x7f5a87c9fe1b] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libgobject-2.0.so.0(g_signal_emit_valist+0xe11)[0x7f5a87ca7ff1] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libgobject-2.0.so.0(g_signal_emit+0x8f)[0x7f5a87ca82df] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libgio-2.0.so.0(+0xcbcec)[0x7f5a87f99cec] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libgio-2.0.so.0(+0xbb2a5)[0x7f5a87f892a5] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libglib-2.0.so.0(+0x48c77)[0x7f5a879b0c77] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libglib-2.0.so.0(g_main_context_dispatch+0x159)[0x7f5a879b4049] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libglib-2.0.so.0(+0x4c3a8)[0x7f5a879b43a8] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libglib-2.0.so.0(g_main_loop_run+0x6a)[0x7f5a879b467a] >Jul 05 15:20:01 m72e gdm[22741]: /usr/sbin/gdm(+0xfcd1)[0x55e4523c9cd1] >Jul 05 15:20:01 m72e gdm[22741]: /lib64/libc.so.6(__libc_start_main+0xf5)[0x7f5a86af93d5] >Jul 05 15:20:01 m72e gdm[22741]: /usr/sbin/gdm(+0xff59)[0x55e4523c9f59] >Jul 05 15:20:01 m72e gdm[22741]: ======= Memory map: ======== >Jul 05 15:20:01 m72e gdm[22741]: 55e4523ba000-55e45241b000 r-xp 00000000 08:02 404246096 /usr/sbin/gdm >Jul 05 15:20:01 m72e gdm[22741]: 55e45261b000-55e452621000 r--p 00061000 08:02 404246096 /usr/sbin/gdm >Jul 05 15:20:01 m72e gdm[22741]: 55e452621000-55e452622000 rw-p 00067000 08:02 404246096 /usr/sbin/gdm >Jul 05 15:20:01 m72e gdm[22741]: 55e4533d9000-55e453458000 rw-p 00000000 00:00 0 [heap] >Jul 05 15:20:01 m72e gdm[22741]: 7f5a64000000-7f5a64022000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a64022000-7f5a68000000 ---p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a6c000000-7f5a6c022000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a6c022000-7f5a70000000 ---p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a70000000-7f5a70021000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a70021000-7f5a74000000 ---p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a74000000-7f5a74021000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a74021000-7f5a78000000 ---p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a7afaa000-7f5a7afab000 ---p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a7afab000-7f5a7b7ab000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a7b7ab000-7f5a7b7ac000 ---p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a7b7ac000-7f5a7bfac000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a7bfac000-7f5a7bfad000 ---p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a7bfad000-7f5a7c7ad000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a7c7ad000-7f5a7c7ae000 ---p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a7c7ae000-7f5a7cfae000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a7cfae000-7f5a7cfba000 r-xp 00000000 08:02 404810219 /usr/lib64/libnss_files-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a7cfba000-7f5a7d1b9000 ---p 0000c000 08:02 404810219 /usr/lib64/libnss_files-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a7d1b9000-7f5a7d1ba000 r--p 0000b000 08:02 404810219 /usr/lib64/libnss_files-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a7d1ba000-7f5a7d1bb000 rw-p 0000c000 08:02 404810219 /usr/lib64/libnss_files-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a7d1bb000-7f5a7d1c1000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a7d1c1000-7f5a836eb000 r--p 00000000 08:02 134232878 /usr/lib/locale/locale-archive >Jul 05 15:20:01 m72e gdm[22741]: 7f5a836eb000-7f5a836fa000 r-xp 00000000 08:02 402759191 /usr/lib64/libbz2.so.1.0.6 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a836fa000-7f5a838f9000 ---p 0000f000 08:02 402759191 /usr/lib64/libbz2.so.1.0.6 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a838f9000-7f5a838fa000 r--p 0000e000 08:02 402759191 /usr/lib64/libbz2.so.1.0.6 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a838fa000-7f5a838fb000 rw-p 0000f000 08:02 402759191 /usr/lib64/libbz2.so.1.0.6 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a838fb000-7f5a83912000 r-xp 00000000 08:02 402759180 /usr/lib64/libelf-0.172.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a83912000-7f5a83b11000 ---p 00017000 08:02 402759180 /usr/lib64/libelf-0.172.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a83b11000-7f5a83b12000 r--p 00016000 08:02 402759180 /usr/lib64/libelf-0.172.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a83b12000-7f5a83b13000 rw-p 00017000 08:02 402759180 /usr/lib64/libelf-0.172.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a83b13000-7f5a83b17000 r-xp 00000000 08:02 402687657 /usr/lib64/libattr.so.1.1.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a83b17000-7f5a83d16000 ---p 00004000 08:02 402687657 /usr/lib64/libattr.so.1.1.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a83d16000-7f5a83d17000 r--p 00003000 08:02 402687657 /usr/lib64/libattr.so.1.1.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a83d17000-7f5a83d18000 rw-p 00004000 08:02 402687657 /usr/lib64/libattr.so.1.1.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a83d18000-7f5a83d1a000 r-xp 00000000 08:02 402660474 /usr/lib64/libfreebl3.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a83d1a000-7f5a83f19000 ---p 00002000 08:02 402660474 /usr/lib64/libfreebl3.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a83f19000-7f5a83f1a000 r--p 00001000 08:02 402660474 /usr/lib64/libfreebl3.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a83f1a000-7f5a83f1b000 rw-p 00002000 08:02 402660474 /usr/lib64/libfreebl3.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a83f1b000-7f5a83f1f000 r-xp 00000000 08:02 404318661 /usr/lib64/libuuid.so.1.3.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a83f1f000-7f5a8411e000 ---p 00004000 08:02 404318661 /usr/lib64/libuuid.so.1.3.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8411e000-7f5a8411f000 r--p 00003000 08:02 404318661 /usr/lib64/libuuid.so.1.3.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8411f000-7f5a84120000 rw-p 00004000 08:02 404318661 /usr/lib64/libuuid.so.1.3.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a84120000-7f5a8415c000 r-xp 00000000 08:02 404363268 /usr/lib64/libblkid.so.1.1.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8415c000-7f5a8435b000 ---p 0003c000 08:02 404363268 /usr/lib64/libblkid.so.1.1.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8435b000-7f5a8435e000 r--p 0003b000 08:02 404363268 /usr/lib64/libblkid.so.1.1.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8435e000-7f5a8435f000 rw-p 0003e000 08:02 404363268 /usr/lib64/libblkid.so.1.1.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8435f000-7f5a84360000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a84360000-7f5a843ac000 r-xp 00000000 08:02 402654656 /usr/lib64/libdw-0.172.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a843ac000-7f5a845ac000 ---p 0004c000 08:02 402654656 /usr/lib64/libdw-0.172.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a845ac000-7f5a845ae000 r--p 0004c000 08:02 402654656 /usr/lib64/libdw-0.172.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a845ae000-7f5a845af000 rw-p 0004e000 08:02 402654656 /usr/lib64/libdw-0.172.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a845af000-7f5a845b3000 r-xp 00000000 08:02 402825383 /usr/lib64/libgpg-error.so.0.10.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a845b3000-7f5a847b2000 ---p 00004000 08:02 402825383 /usr/lib64/libgpg-error.so.0.10.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a847b2000-7f5a847b3000 r--p 00003000 08:02 402825383 /usr/lib64/libgpg-error.so.0.10.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a847b3000-7f5a847b4000 rw-p 00004000 08:02 402825383 /usr/lib64/libgpg-error.so.0.10.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a847b4000-7f5a84831000 r-xp 00000000 08:02 402758938 /usr/lib64/libgcrypt.so.11.8.2 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a84831000-7f5a84a30000 ---p 0007d000 08:02 402758938 /usr/lib64/libgcrypt.so.11.8.2 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a84a30000-7f5a84a31000 r--p 0007c000 08:02 402758938 /usr/lib64/libgcrypt.so.11.8.2 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a84a31000-7f5a84a34000 rw-p 0007d000 08:02 402758938 /usr/lib64/libgcrypt.so.11.8.2 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a84a34000-7f5a84a35000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a84a35000-7f5a84a49000 r-xp 00000000 08:02 402659900 /usr/lib64/liblz4.so.1.7.5 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a84a49000-7f5a84c48000 ---p 00014000 08:02 402659900 /usr/lib64/liblz4.so.1.7.5 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a84c48000-7f5a84c49000 r--p 00013000 08:02 402659900 /usr/lib64/liblz4.so.1.7.5 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a84c49000-7f5a84c4a000 rw-p 00014000 08:02 402659900 /usr/lib64/liblz4.so.1.7.5 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a84c4a000-7f5a84c6f000 r-xp 00000000 08:02 404286709 /usr/lib64/liblzma.so.5.2.2 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a84c6f000-7f5a84e6e000 ---p 00025000 08:02 404286709 /usr/lib64/liblzma.so.5.2.2 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a84e6e000-7f5a84e6f000 r--p 00024000 08:02 404286709 /usr/lib64/liblzma.so.5.2.2 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a84e6f000-7f5a84e70000 rw-p 00025000 08:02 404286709 /usr/lib64/liblzma.so.5.2.2 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a84e70000-7f5a84e77000 r-xp 00000000 08:02 404810226 /usr/lib64/librt-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a84e77000-7f5a85076000 ---p 00007000 08:02 404810226 /usr/lib64/librt-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85076000-7f5a85077000 r--p 00006000 08:02 404810226 /usr/lib64/librt-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85077000-7f5a85078000 rw-p 00007000 08:02 404810226 /usr/lib64/librt-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85078000-7f5a85179000 r-xp 00000000 08:02 404810209 /usr/lib64/libm-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85179000-7f5a85378000 ---p 00101000 08:02 404810209 /usr/lib64/libm-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85378000-7f5a85379000 r--p 00100000 08:02 404810209 /usr/lib64/libm-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85379000-7f5a8537a000 rw-p 00101000 08:02 404810209 /usr/lib64/libm-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8537a000-7f5a8537e000 r-xp 00000000 08:02 402713865 /usr/lib64/libcap.so.2.22 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8537e000-7f5a8557d000 ---p 00004000 08:02 402713865 /usr/lib64/libcap.so.2.22 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8557d000-7f5a8557e000 r--p 00003000 08:02 402713865 /usr/lib64/libcap.so.2.22 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8557e000-7f5a8557f000 rw-p 00004000 08:02 402713865 /usr/lib64/libcap.so.2.22 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8557f000-7f5a85587000 r-xp 00000000 08:02 404230255 /usr/lib64/libcrypt-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85587000-7f5a85786000 ---p 00008000 08:02 404230255 /usr/lib64/libcrypt-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85786000-7f5a85787000 r--p 00007000 08:02 404230255 /usr/lib64/libcrypt-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85787000-7f5a85788000 rw-p 00008000 08:02 404230255 /usr/lib64/libcrypt-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85788000-7f5a857b6000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a857b6000-7f5a857cb000 r-xp 00000000 08:02 404614628 /usr/lib64/libgcc_s-4.8.5-20150702.so.1 >Jul 05 15:20:01 m72e abrt-hook-ccpp[24032]: Process 22741 (gdm) of user 0 killed by SIGABRT - dumping core >Jul 05 15:20:01 m72e gdm[22741]: 7f5a857cb000-7f5a859ca000 ---p 00015000 08:02 404614628 /usr/lib64/libgcc_s-4.8.5-20150702.so.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a859ca000-7f5a859cb000 r--p 00014000 08:02 404614628 /usr/lib64/libgcc_s-4.8.5-20150702.so.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a859cb000-7f5a859cc000 rw-p 00015000 08:02 404614628 /usr/lib64/libgcc_s-4.8.5-20150702.so.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a859cc000-7f5a85a0c000 r-xp 00000000 08:02 404934324 /usr/lib64/libmount.so.1.1.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85a0c000-7f5a85c0c000 ---p 00040000 08:02 404934324 /usr/lib64/libmount.so.1.1.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85c0c000-7f5a85c0d000 r--p 00040000 08:02 404934324 /usr/lib64/libmount.so.1.1.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85c0d000-7f5a85c0e000 rw-p 00041000 08:02 404934324 /usr/lib64/libmount.so.1.1.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85c0e000-7f5a85c0f000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85c0f000-7f5a85c25000 r-xp 00000000 08:02 404810224 /usr/lib64/libresolv-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85c25000-7f5a85e24000 ---p 00016000 08:02 404810224 /usr/lib64/libresolv-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85e24000-7f5a85e25000 r--p 00015000 08:02 404810224 /usr/lib64/libresolv-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85e25000-7f5a85e26000 rw-p 00016000 08:02 404810224 /usr/lib64/libresolv-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85e26000-7f5a85e28000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85e28000-7f5a85e4c000 r-xp 00000000 08:02 404810237 /usr/lib64/libselinux.so.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a85e4c000-7f5a8604b000 ---p 00024000 08:02 404810237 /usr/lib64/libselinux.so.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8604b000-7f5a8604c000 r--p 00023000 08:02 404810237 /usr/lib64/libselinux.so.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8604c000-7f5a8604d000 rw-p 00024000 08:02 404810237 /usr/lib64/libselinux.so.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8604d000-7f5a8604f000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8604f000-7f5a86064000 r-xp 00000000 08:02 402666844 /usr/lib64/libz.so.1.2.7 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a86064000-7f5a86263000 ---p 00015000 08:02 402666844 /usr/lib64/libz.so.1.2.7 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a86263000-7f5a86264000 r--p 00014000 08:02 402666844 /usr/lib64/libz.so.1.2.7 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a86264000-7f5a86265000 rw-p 00015000 08:02 402666844 /usr/lib64/libz.so.1.2.7 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a86265000-7f5a862c5000 r-xp 00000000 08:02 402659796 /usr/lib64/libpcre.so.1.2.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a862c5000-7f5a864c5000 ---p 00060000 08:02 402659796 /usr/lib64/libpcre.so.1.2.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a864c5000-7f5a864c6000 r--p 00060000 08:02 402659796 /usr/lib64/libpcre.so.1.2.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a864c6000-7f5a864c7000 rw-p 00061000 08:02 402659796 /usr/lib64/libpcre.so.1.2.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a864c7000-7f5a864c9000 r-xp 00000000 08:02 404320734 /usr/lib64/libdl-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a864c9000-7f5a866c9000 ---p 00002000 08:02 404320734 /usr/lib64/libdl-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a866c9000-7f5a866ca000 r--p 00002000 08:02 404320734 /usr/lib64/libdl-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a866ca000-7f5a866cb000 rw-p 00003000 08:02 404320734 /usr/lib64/libdl-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a866cb000-7f5a866ce000 r-xp 00000000 08:02 404999367 /usr/lib64/libgmodule-2.0.so.0.5600.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a866ce000-7f5a868cd000 ---p 00003000 08:02 404999367 /usr/lib64/libgmodule-2.0.so.0.5600.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a868cd000-7f5a868ce000 r--p 00002000 08:02 404999367 /usr/lib64/libgmodule-2.0.so.0.5600.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a868ce000-7f5a868cf000 rw-p 00003000 08:02 404999367 /usr/lib64/libgmodule-2.0.so.0.5600.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a868cf000-7f5a868d6000 r-xp 00000000 08:02 403056696 /usr/lib64/libffi.so.6.0.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a868d6000-7f5a86ad5000 ---p 00007000 08:02 403056696 /usr/lib64/libffi.so.6.0.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a86ad5000-7f5a86ad6000 r--p 00006000 08:02 403056696 /usr/lib64/libffi.so.6.0.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a86ad6000-7f5a86ad7000 rw-p 00007000 08:02 403056696 /usr/lib64/libffi.so.6.0.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a86ad7000-7f5a86c99000 r-xp 00000000 08:02 402655539 /usr/lib64/libc-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a86c99000-7f5a86e99000 ---p 001c2000 08:02 402655539 /usr/lib64/libc-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a86e99000-7f5a86e9d000 r--p 001c2000 08:02 402655539 /usr/lib64/libc-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a86e9d000-7f5a86e9f000 rw-p 001c6000 08:02 402655539 /usr/lib64/libc-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a86e9f000-7f5a86ea4000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a86ea4000-7f5a86ebb000 r-xp 00000000 08:02 402660476 /usr/lib64/libpthread-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a86ebb000-7f5a870ba000 ---p 00017000 08:02 402660476 /usr/lib64/libpthread-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a870ba000-7f5a870bb000 r--p 00016000 08:02 402660476 /usr/lib64/libpthread-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a870bb000-7f5a870bc000 rw-p 00017000 08:02 402660476 /usr/lib64/libpthread-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a870bc000-7f5a870c0000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a870c0000-7f5a870ef000 r-xp 00000000 08:02 402881184 /usr/lib64/libsystemd.so.0.6.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a870ef000-7f5a872ef000 ---p 0002f000 08:02 402881184 /usr/lib64/libsystemd.so.0.6.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a872ef000-7f5a872f0000 r--p 0002f000 08:02 402881184 /usr/lib64/libsystemd.so.0.6.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a872f0000-7f5a872f1000 rw-p 00030000 08:02 402881184 /usr/lib64/libsystemd.so.0.6.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a872f1000-7f5a872f6000 r-xp 00000000 08:02 403081243 /usr/lib64/libXdmcp.so.6.0.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a872f6000-7f5a874f5000 ---p 00005000 08:02 403081243 /usr/lib64/libXdmcp.so.6.0.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a874f5000-7f5a874f6000 r--p 00004000 08:02 403081243 /usr/lib64/libXdmcp.so.6.0.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a874f6000-7f5a874f7000 rw-p 00005000 08:02 403081243 /usr/lib64/libXdmcp.so.6.0.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a874f7000-7f5a8751e000 r-xp 00000000 08:02 403086645 /usr/lib64/libxcb.so.1.1.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8751e000-7f5a8771d000 ---p 00027000 08:02 403086645 /usr/lib64/libxcb.so.1.1.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8771d000-7f5a8771e000 r--p 00026000 08:02 403086645 /usr/lib64/libxcb.so.1.1.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8771e000-7f5a8771f000 rw-p 00027000 08:02 403086645 /usr/lib64/libxcb.so.1.1.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8771f000-7f5a87761000 r-xp 00000000 08:02 402985038 /usr/lib64/libaccountsservice.so.0.0.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a87761000-7f5a87961000 ---p 00042000 08:02 402985038 /usr/lib64/libaccountsservice.so.0.0.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a87961000-7f5a87967000 r--p 00042000 08:02 402985038 /usr/lib64/libaccountsservice.so.0.0.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a87967000-7f5a87968000 rw-p 00048000 08:02 402985038 /usr/lib64/libaccountsservice.so.0.0.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a87968000-7f5a87a7c000 r-xp 00000000 08:02 404973051 /usr/lib64/libglib-2.0.so.0.5600.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a87a7c000-7f5a87c7b000 ---p 00114000 08:02 404973051 /usr/lib64/libglib-2.0.so.0.5600.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a87c7b000-7f5a87c7c000 r--p 00113000 08:02 404973051 /usr/lib64/libglib-2.0.so.0.5600.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a87c7c000-7f5a87c7d000 rw-p 00114000 08:02 404973051 /usr/lib64/libglib-2.0.so.0.5600.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a87c7d000-7f5a87c7e000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a87c7e000-7f5a87ccd000 r-xp 00000000 08:02 404999386 /usr/lib64/libgobject-2.0.so.0.5600.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a87ccd000-7f5a87ecc000 ---p 0004f000 08:02 404999386 /usr/lib64/libgobject-2.0.so.0.5600.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a87ecc000-7f5a87ecd000 r--p 0004e000 08:02 404999386 /usr/lib64/libgobject-2.0.so.0.5600.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a87ecd000-7f5a87ece000 rw-p 0004f000 08:02 404999386 /usr/lib64/libgobject-2.0.so.0.5600.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a87ece000-7f5a88063000 r-xp 00000000 08:02 404784178 /usr/lib64/libgio-2.0.so.0.5600.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a88063000-7f5a88263000 ---p 00195000 08:02 404784178 /usr/lib64/libgio-2.0.so.0.5600.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a88263000-7f5a88268000 r--p 00195000 08:02 404784178 /usr/lib64/libgio-2.0.so.0.5600.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a88268000-7f5a8826b000 rw-p 0019a000 08:02 404784178 /usr/lib64/libgio-2.0.so.0.5600.1 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8826b000-7f5a8826d000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8826d000-7f5a8826f000 r-xp 00000000 08:02 403081236 /usr/lib64/libXau.so.6.0.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8826f000-7f5a8846f000 ---p 00002000 08:02 403081236 /usr/lib64/libXau.so.6.0.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8846f000-7f5a88470000 r--p 00002000 08:02 403081236 /usr/lib64/libXau.so.6.0.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a88470000-7f5a88471000 rw-p 00003000 08:02 403081236 /usr/lib64/libXau.so.6.0.0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a88471000-7f5a88493000 r-xp 00000000 08:02 402660745 /usr/lib64/ld-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8865f000-7f5a88670000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a8868e000-7f5a88692000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7f5a88692000-7f5a88693000 r--p 00021000 08:02 402660745 /usr/lib64/ld-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a88693000-7f5a88694000 rw-p 00022000 08:02 402660745 /usr/lib64/ld-2.17.so >Jul 05 15:20:01 m72e gdm[22741]: 7f5a88694000-7f5a88695000 rw-p 00000000 00:00 0 >Jul 05 15:20:01 m72e gdm[22741]: 7ffdedb27000-7ffdedb48000 rw-p 00000000 00:00 0 [stack] >Jul 05 15:20:01 m72e gdm[22741]: 7ffdedb5a000-7ffdedb5c000 r-xp 00000000 00:00 0 [vdso] >Jul 05 15:20:01 m72e gdm[22741]: ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall] >Jul 05 15:20:02 m72e dbus[753]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Jul 05 15:20:02 m72e gnome-shell[23294]: JS ERROR: Failed to open reauthentication channel: Gio.DBusError: GDBus.Error:org.freedesktop.DBus.Error.NoReply: Message recipient disconnected from message bus without replying > _reauthenticationChannelOpened@resource:///org/gnome/shell/gdm/util.js:363:34 > wrapper@resource:///org/gnome/gjs/modules/_legacy.js:82:22 >Jul 05 15:20:02 m72e systemd[1]: gdm.service: main process exited, code=dumped, status=6/ABRT >Jul 05 15:20:02 m72e gsd-power[23425]: gsd-power: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:20:02 m72e org.a11y.atspi.Registry[23261]: XIO: fatal IO error 11 (Resource temporarily unavailable) on X server ":0" >Jul 05 15:20:02 m72e org.a11y.atspi.Registry[23261]: after 129 requests (129 known processed) with 0 events remaining. >Jul 05 15:20:02 m72e gnome-shell[23294]: gnome-shell: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:20:02 m72e kernel: rfkill: input handler enabled >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: App 'org.gnome.SettingsDaemon.XSettings.desktop' exited with code 1 >Jul 05 15:20:02 m72e unknown[23441]: gsd-xsettings: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: App 'org.gnome.SettingsDaemon.XSettings.desktop' exited with code 1 >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: App 'org.gnome.SettingsDaemon.Clipboard.desktop' exited with code 1 >Jul 05 15:20:02 m72e org.gtk.vfs.Daemon[23076]: A connection to the bus can't be made >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: App 'org.gnome.SettingsDaemon.Clipboard.desktop' exited with code 1 >Jul 05 15:20:02 m72e unknown[23453]: gsd-wacom: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:20:02 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[23485]: terminator: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:20:02 m72e unknown[23472]: gsd-clipboard: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:20:02 m72e gsd-media-keys[23485]: gsd-media-keys: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:20:02 m72e sealertauto.desktop[23820]: seapplet: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:20:02 m72e unknown[23480]: gsd-keyboard: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:20:02 m72e gsd-color[23475]: gsd-color: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:20:02 m72e unknown[23823]: abrt: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:20:02 m72e unknown[23835]: rhsm-icon: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:20:02 m72e evolution-alarm[23822]: evolution-alarm-notify: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Jul 05 15:20:02 m72e systemd[1]: Unit gdm.service entered failed state. >Jul 05 15:20:02 m72e systemd[1]: Triggering OnFailure= dependencies of gdm.service. >Jul 05 15:20:02 m72e systemd[1]: gdm.service failed. >Jul 05 15:20:02 m72e systemd[1]: Starting Terminate Plymouth Boot Screen... >Jul 05 15:20:02 m72e ibus-daemon[23323]: GChildWatchSource: Exit status of a child process was requested but ECHILD was received by waitpid(). See the documentation of g_child_watch_source_new() for possible causes. >Jul 05 15:20:02 m72e org.gnome.Shell.CalendarServer[23076]: gnome-shell-calendar-server[23347]: Lost (or failed to acquire) the name org.gnome.Shell.CalendarServer - exiting >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 15:20:02 m72e polkitd[771]: Unregistered Authentication Agent for unix-session:57 (system bus name :1.443, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) (disconnected from bus) >Jul 05 15:20:02 m72e abrt-server[24037]: Duplicate: core backtrace >Jul 05 15:20:02 m72e abrt-server[24037]: DUP_OF_DIR: /var/spool/abrt/ccpp-2018-07-03-07:58:18-1313 >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: App 'org.gnome.Shell.desktop' exited with code 1 >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: App 'org.gnome.Shell.desktop' exited with code 1 >Jul 05 15:20:02 m72e abrt-server[24037]: Deleting problem directory ccpp-2018-07-05-15:20:01-22741 (dup of ccpp-2018-07-03-07:58:18-1313) >Jul 05 15:20:02 m72e org.gtk.vfs.Daemon[23076]: A connection to the bus can't be made >Jul 05 15:20:02 m72e gnome-session-f[24046]: Cannot open display: >Jul 05 15:20:02 m72e org.gnome.SettingsDaemon.Clipboard.desktop[24041]: Cannot open display: >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: App 'org.gnome.SettingsDaemon.Power.desktop' exited with code 1 >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: App 'org.gnome.SettingsDaemon.Power.desktop' exited with code 1 >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.PrintNotifications.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Rfkill.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.ScreensaverProxy.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Sharing.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Smartcard.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Sound.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: App 'org.gnome.SettingsDaemon.Wacom.desktop' exited with code 1 >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.PrintNotifications.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Rfkill.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.ScreensaverProxy.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Sharing.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Smartcard.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Sound.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: App 'org.gnome.SettingsDaemon.Wacom.desktop' exited with code 1 >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 15:20:02 m72e systemd[1]: Started Terminate Plymouth Boot Screen. >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: App 'org.gnome.SettingsDaemon.Color.desktop' exited with code 1 >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Datetime.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Housekeeping.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: App 'org.gnome.SettingsDaemon.Keyboard.desktop' exited with code 1 >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: App 'org.gnome.SettingsDaemon.MediaKeys.desktop' exited with code 1 >Jul 05 15:20:02 m72e gnome-session[23066]: gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: App 'org.gnome.SettingsDaemon.Color.desktop' exited with code 1 >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Datetime.desktop' killed by signal 15 >Jul 05 15:20:02 m72e systemd[1]: gdm.service holdoff time over, scheduling restart. >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Housekeeping.desktop' killed by signal 15 >Jul 05 15:20:02 m72e systemd[1]: Stopped GNOME Display Manager. >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: App 'org.gnome.SettingsDaemon.Keyboard.desktop' exited with code 1 >Jul 05 15:20:02 m72e systemd[1]: Starting GNOME Display Manager... >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: App 'org.gnome.SettingsDaemon.MediaKeys.desktop' exited with code 1 >Jul 05 15:20:02 m72e gnome-session-binary[23066]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 15:20:02 m72e gdm-password][23027]: pam_unix(gdm-password:session): session closed for user whot >Jul 05 15:20:02 m72e systemd[1]: Started GNOME Display Manager. >Jul 05 15:20:02 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 15:20:02 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 15:20:02 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 15:20:02 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 15:20:02 m72e abrt-server[24037]: Email address of sender was not specified. Would you like to do so now? If not, 'user@localhost' is to be used [y/N] >Jul 05 15:20:02 m72e abrt-server[24037]: Email address of receiver was not specified. Would you like to do so now? If not, 'root@localhost' is to be used [y/N] >Jul 05 15:20:02 m72e abrt-server[24037]: Sending an email... >Jul 05 15:20:02 m72e abrt-server[24037]: Sending a notification email to: root@localhost >Jul 05 15:20:02 m72e postfix/sendmail[24076]: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 15:20:02 m72e abrt-server[24037]: send-mail: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 15:20:02 m72e postfix/sendmail[24076]: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 15:20:02 m72e abrt-server[24037]: send-mail: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 15:20:02 m72e abrt-server[24037]: Error running '/bin/mailx' >Jul 05 15:20:02 m72e dbus[753]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Jul 05 15:20:03 m72e setroubleshoot[24036]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/sbin/gdm. For complete SELinux messages run: sealert -l a5294b69-64db-48f8-9f04-5919c22322c6 >Jul 05 15:20:03 m72e python[24036]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/sbin/gdm. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gdm file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 15:20:03 m72e systemd[1]: Created slice User Slice of gdm. >Jul 05 15:20:03 m72e systemd-logind[774]: New session c5 of user gdm. >Jul 05 15:20:03 m72e systemd[1]: Started Session c5 of user gdm. >Jul 05 15:20:03 m72e gdm-launch-environment][24095]: pam_unix(gdm-launch-environment:session): session opened for user gdm by whot(uid=0) >Jul 05 15:20:03 m72e setroubleshoot[24036]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/sbin/gdm. For complete SELinux messages run: sealert -l a5294b69-64db-48f8-9f04-5919c22322c6 >Jul 05 15:20:03 m72e python[24036]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/sbin/gdm. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gdm file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 15:20:03 m72e org.a11y.Bus[24108]: Activating service name='org.a11y.atspi.Registry' >Jul 05 15:20:03 m72e org.a11y.Bus[24108]: Successfully activated service 'org.a11y.atspi.Registry' >Jul 05 15:20:03 m72e org.a11y.atspi.Registry[24118]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry >Jul 05 15:20:03 m72e gnome-session[24101]: generating cookie with syscall >Jul 05 15:20:03 m72e gnome-session[24101]: generating cookie with syscall >Jul 05 15:20:03 m72e gnome-session[24101]: generating cookie with syscall >Jul 05 15:20:03 m72e gnome-session[24101]: generating cookie with syscall >Jul 05 15:20:03 m72e setroubleshoot[24036]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 15:20:03 m72e python[24036]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 15:20:03 m72e setroubleshoot[24036]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 15:20:03 m72e python[24036]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 15:20:03 m72e setroubleshoot[24036]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. For complete SELinux messages run: sealert -l c2670567-6ce1-42fd-bb01-7cdf552b3c40 >Jul 05 15:20:03 m72e python[24036]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that postdrop should be allowed map access on the postdrop file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'postdrop' --raw | audit2allow -M my-postdrop > # semodule -i my-postdrop.pp > >Jul 05 15:20:03 m72e rtkit-daemon[770]: Successfully made thread 24164 of process 24164 (/usr/bin/pulseaudio) owned by '42' high priority at nice level -11. >Jul 05 15:20:03 m72e rtkit-daemon[770]: Supervising 1 threads of 1 processes of 1 users. >Jul 05 15:20:04 m72e rtkit-daemon[770]: Supervising 1 threads of 1 processes of 1 users. >Jul 05 15:20:04 m72e rtkit-daemon[770]: Successfully made thread 24167 of process 24164 (/usr/bin/pulseaudio) owned by '42' RT at priority 5. >Jul 05 15:20:04 m72e rtkit-daemon[770]: Supervising 2 threads of 1 processes of 1 users. >Jul 05 15:20:04 m72e rtkit-daemon[770]: Supervising 2 threads of 1 processes of 1 users. >Jul 05 15:20:04 m72e rtkit-daemon[770]: Successfully made thread 24170 of process 24164 (/usr/bin/pulseaudio) owned by '42' RT at priority 5. >Jul 05 15:20:04 m72e rtkit-daemon[770]: Supervising 3 threads of 1 processes of 1 users. >Jul 05 15:20:04 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Jul 05 15:20:04 m72e systemd[1]: Starting Locale Service... >Jul 05 15:20:04 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.locale1' >Jul 05 15:20:04 m72e systemd[1]: Started Locale Service. >Jul 05 15:20:05 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' >Jul 05 15:20:05 m72e systemd[1]: Starting Location Lookup Service... >Jul 05 15:20:05 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.GeoClue2' >Jul 05 15:20:05 m72e systemd[1]: Started Location Lookup Service. >Jul 05 15:20:05 m72e polkitd[771]: Registered Authentication Agent for unix-session:c5 (system bus name :1.500 [/usr/bin/gnome-shell], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) >Jul 05 15:20:05 m72e spice-vdagent[24219]: Cannot access vdagent virtio channel /dev/virtio-ports/com.redhat.spice.0 >Jul 05 15:20:05 m72e gnome-session[24101]: gnome-session-binary[24101]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 15:20:05 m72e gnome-session-binary[24101]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 15:20:05 m72e gnome-shell[24143]: Failed to load background 'file:///usr/share/backgrounds/gnome/adwaita-lock.jpg': Error opening file /usr/share/backgrounds/gnome/adwaita-lock.jpg: No such file or directory >Jul 05 15:20:05 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' >Jul 05 15:20:05 m72e systemd[1]: Starting Hostname Service... >Jul 05 15:20:05 m72e gnome-session-binary[24101]: Entering running state >Jul 05 15:20:05 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.hostname1' >Jul 05 15:20:05 m72e systemd[1]: Started Hostname Service. >Jul 05 15:20:05 m72e gnome-shell[24143]: Some code accessed the property 'AuthList' on the module 'authList'. That property was defined with 'let' or 'const' inside the module. This was previously supported, but is not correct according to the ES6 standard. Any symbols to be exported from a module must be defined with 'var'. The property access will work as previously for the time being, but please fix your code anyway. >Jul 05 15:20:05 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.realmd' unit='realmd.service' >Jul 05 15:20:05 m72e systemd[1]: Starting Realm and Domain Configuration... >Jul 05 15:20:05 m72e realmd[24311]: Loaded settings from: /usr/lib64/realmd/realmd-defaults.conf /usr/lib64/realmd/realmd-distro.conf >Jul 05 15:20:05 m72e realmd[24311]: holding daemon: startup >Jul 05 15:20:05 m72e realmd[24311]: starting service >Jul 05 15:20:05 m72e realmd[24311]: connected to bus >Jul 05 15:20:05 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.realmd' >Jul 05 15:20:05 m72e realmd[24311]: released daemon: startup >Jul 05 15:20:05 m72e systemd[1]: Started Realm and Domain Configuration. >Jul 05 15:20:05 m72e realmd[24311]: claimed name on bus: org.freedesktop.realmd >Jul 05 15:20:05 m72e org.gnome.Shell.desktop[24143]: Window manager warning: "XF86RFKill" is not a valid accelerator >Jul 05 15:20:05 m72e gnome-shell[24143]: Error looking up permission: GDBus.Error:org.freedesktop.portal.Error.NotFound: No entry for geolocation >Jul 05 15:20:05 m72e setroubleshoot[24036]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. For complete SELinux messages run: sealert -l 878583e9-e1dd-462e-a486-e30159ea9944 >Jul 05 15:20:05 m72e python[24036]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that gnome-shell should be allowed map access on the hwdb.bin file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell > # semodule -i my-gnomeshell.pp > >Jul 05 15:20:05 m72e gnome-shell[24143]: JS WARNING: [resource:///org/gnome/shell/ui/layout.js 29]: reference to undefined property "MetaWindowX11" >Jul 05 15:20:08 m72e setroubleshoot[24036]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. For complete SELinux messages run: sealert -l 878583e9-e1dd-462e-a486-e30159ea9944 >Jul 05 15:20:08 m72e python[24036]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that gnome-shell should be allowed map access on the hwdb.bin file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell > # semodule -i my-gnomeshell.pp > >Jul 05 15:20:10 m72e setroubleshoot[24036]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. For complete SELinux messages run: sealert -l 878583e9-e1dd-462e-a486-e30159ea9944 >Jul 05 15:20:10 m72e python[24036]: SELinux is preventing /usr/bin/gnome-shell from map access on the file /etc/udev/hwdb.bin. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that gnome-shell should be allowed map access on the hwdb.bin file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell > # semodule -i my-gnomeshell.pp > >Jul 05 15:20:10 m72e systemd-logind[774]: New session 59 of user whot. >Jul 05 15:20:10 m72e systemd[1]: Started Session 59 of user whot. >Jul 05 15:20:10 m72e gdm-password][24334]: pam_unix(gdm-password:session): session opened for user whot by whot(uid=0) >Jul 05 15:20:13 m72e gnome-session-binary[24101]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 15:20:13 m72e gnome-session[24101]: gnome-session-binary[24101]: WARNING: Application 'org.gnome.SettingsDaemon.A11ySettings.desktop' killed by signal 15 >Jul 05 15:20:13 m72e gnome-session[24101]: gnome-session-binary[24101]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 15:20:13 m72e gnome-session-binary[24101]: WARNING: Application 'org.gnome.SettingsDaemon.Mouse.desktop' killed by signal 15 >Jul 05 15:20:13 m72e gnome-session-binary[24101]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 15:20:13 m72e gnome-session[24101]: gnome-session-binary[24101]: WARNING: Lost name on bus: org.gnome.SessionManager >Jul 05 15:20:13 m72e polkitd[771]: Unregistered Authentication Agent for unix-session:c5 (system bus name :1.500, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) (disconnected from bus) >Jul 05 15:20:13 m72e gnome-session-f[24358]: Cannot open display: >Jul 05 15:20:13 m72e gdm-password][24361]: unable to log session >Jul 05 15:20:13 m72e com.redhat.imsettings[24372]: [ 1530768013.376673]: IMSettings-Daemon[24441]: INFO: Starting imsettings-daemon... >Jul 05 15:20:13 m72e com.redhat.imsettings[24372]: [ 1530768013.376807]: IMSettings-Daemon[24441]: INFO: [HOME=/home/whot/.config/imsettings] >Jul 05 15:20:13 m72e com.redhat.imsettings[24372]: [ 1530768013.376847]: IMSettings-Daemon[24441]: INFO: [XINPUTRCDIR=/etc/X11/xinit/] >Jul 05 15:20:13 m72e com.redhat.imsettings[24372]: [ 1530768013.376885]: IMSettings-Daemon[24441]: INFO: [XINPUTDIR=/etc/X11/xinit/xinput.d/] >Jul 05 15:20:13 m72e com.redhat.imsettings[24372]: [ 1530768013.376921]: IMSettings-Daemon[24441]: INFO: [MODULEDIR=/usr/lib64/imsettings] >Jul 05 15:20:13 m72e com.redhat.imsettings[24372]: [ 1530768013.376961]: IMSettings-Daemon[24441]: INFO: [MODULES=gsettings, qt] >Jul 05 15:20:13 m72e org.a11y.Bus[24372]: Activating service name='org.a11y.atspi.Registry' >Jul 05 15:20:13 m72e org.a11y.Bus[24372]: Successfully activated service 'org.a11y.atspi.Registry' >Jul 05 15:20:13 m72e org.a11y.atspi.Registry[24560]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry >Jul 05 15:20:13 m72e gnome-session[24361]: generating cookie with syscall >Jul 05 15:20:13 m72e gnome-session[24361]: generating cookie with syscall >Jul 05 15:20:13 m72e gnome-session[24361]: generating cookie with syscall >Jul 05 15:20:13 m72e gnome-session[24361]: generating cookie with syscall >Jul 05 15:20:13 m72e gnome-keyring-daemon[24352]: Gkm: using old keyring directory: /home/whot/.gnome2/keyrings >Jul 05 15:20:13 m72e gnome-keyring-daemon[24352]: Gkm: using old keyring directory: /home/whot/.gnome2/keyrings >Jul 05 15:20:13 m72e gnome-keyring-ssh.desktop[24585]: SSH_AUTH_SOCK=/run/user/13349/keyring/ssh >Jul 05 15:20:13 m72e setroubleshoot[24036]: SELinux is preventing /usr/libexec/gdm-session-worker from 'read, append' accesses on the file session.log. For complete SELinux messages run: sealert -l 508ab26c-ffb6-4759-84e1-90e0199490bb >Jul 05 15:20:13 m72e python[24036]: SELinux is preventing /usr/libexec/gdm-session-worker from 'read, append' accesses on the file session.log. > > ***** Plugin catchall_labels (83.8 confidence) suggests ******************* > > If you want to allow gdm-session-worker to have read append access on the session.log file > Then you need to change the label on session.log > Do > # semanage fcontext -a -t FILE_TYPE 'session.log' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, admin_crontab_tmp_t, alsa_tmp_t, amanda_tmp_t, anon_inodefs_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, auditadm_sudo_tmp_t, auth_cache_t, auth_home_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cgroup_t, chrome_sandbox_tmp_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_tmp_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_tmp_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_runtime_tmp_t, couchdb_tmp_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_lpd_tmp_t, cupsd_tmp_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, etc_runtime_t, exim_tmp_t, fail2ban_tmp_t, faillog_t, fenced_tmp_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, initrc_var_run_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, iscsi_tmp_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, lastlog_t, ldconfig_tmp_t, livecd_tmp_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_tmp_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, netutils_tmp_t, neutron_tmp_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, pam_var_console_t, pam_var_run_t, passenger_tmp_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_tmp_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_tmp_t, prelude_lml_tmp_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rsync_tmp_t, rtas_errd_tmp_t, samba_net_tmp_t, sbd_tmpfs_t, sblim_tmp_t, secadm_sudo_tmp_t, sectool_tmp_t, security_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, ssh_agent_tmp_t, ssh_keygen_tmp_t, ssh_tmpfs_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_cronjob_tmp_t, system_dbusd_tmp_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_passwd_var_run_t, targetd_tmp_t, tcpd_tmp_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_tmp_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, tgtd_tmp_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, user_cron_spool_t, user_fonts_t, user_mail_tmp_t, user_tmp_t, uucpd_tmp_t, var_auth_t, var_spool_t, varnishd_tmp_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmtools_tmp_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wireshark_tmp_t, wireshark_tmpfs_t, wtmp_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_lock_t, xdm_log_t, xdm_rw_etc_t, xdm_spool_t, xdm_tmpfs_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenstored_tmp_t, xkb_var_lib_t, xserver_log_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t. > Then execute: > restorecon -v 'session.log' > > > ***** Plugin catchall (17.1 confidence) suggests ************************** > > If you believe that gdm-session-worker should be allowed read append access on the session.log file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdm-session-wor' --raw | audit2allow -M my-gdmsessionwor > # semodule -i my-gdmsessionwor.pp > >Jul 05 15:20:14 m72e rtkit-daemon[770]: Successfully made thread 24602 of process 24602 (/usr/bin/pulseaudio) owned by '13349' high priority at nice level -11. >Jul 05 15:20:14 m72e rtkit-daemon[770]: Supervising 4 threads of 2 processes of 2 users. >Jul 05 15:20:14 m72e pulseaudio[24602]: [pulseaudio] pid.c: Stale PID file, overwriting. >Jul 05 15:20:14 m72e rtkit-daemon[770]: Supervising 4 threads of 2 processes of 2 users. >Jul 05 15:20:14 m72e rtkit-daemon[770]: Successfully made thread 24605 of process 24602 (/usr/bin/pulseaudio) owned by '13349' RT at priority 5. >Jul 05 15:20:14 m72e rtkit-daemon[770]: Supervising 5 threads of 2 processes of 2 users. >Jul 05 15:20:14 m72e rtkit-daemon[770]: Supervising 5 threads of 2 processes of 2 users. >Jul 05 15:20:14 m72e rtkit-daemon[770]: Successfully made thread 24608 of process 24602 (/usr/bin/pulseaudio) owned by '13349' RT at priority 5. >Jul 05 15:20:14 m72e rtkit-daemon[770]: Supervising 6 threads of 2 processes of 2 users. >Jul 05 15:20:14 m72e dbus[753]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' >Jul 05 15:20:15 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' >Jul 05 15:20:15 m72e systemd[1]: Starting Location Lookup Service... >Jul 05 15:20:15 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.GeoClue2' >Jul 05 15:20:15 m72e systemd[1]: Started Location Lookup Service. >Jul 05 15:20:15 m72e polkitd[771]: Registered Authentication Agent for unix-session:59 (system bus name :1.526 [/usr/bin/gnome-shell], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_AU.utf8) >Jul 05 15:20:15 m72e goa-daemon[24673]: goa-daemon version 3.28.0 starting >Jul 05 15:20:15 m72e goa-identity-se[24690]: GoaKerberosIdentityManager: Using polling for change notification for credential cache type 'KEYRING' >Jul 05 15:20:15 m72e org.gtk.vfs.AfcVolumeMonitor[24372]: Volume monitor alive >Jul 05 15:20:15 m72e spice-vdagent[24754]: Cannot access vdagent virtio channel /dev/virtio-ports/com.redhat.spice.0 >Jul 05 15:20:15 m72e gnome-shell[24592]: Some code accessed the property '_modes' on the module 'sessionMode'. That property was defined with 'let' or 'const' inside the module. This was previously supported, but is not correct according to the ES6 standard. Any symbols to be exported from a module must be defined with 'var'. The property access will work as previously for the time being, but please fix your code anyway. >Jul 05 15:20:15 m72e gnome-session-binary[24361]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 15:20:15 m72e gnome-session[24361]: gnome-session-binary[24361]: WARNING: App 'spice-vdagent.desktop' exited with code 1 >Jul 05 15:20:15 m72e kernel: traps: gsd-account[24723] trap int3 ip:7fdd5eef5b11 sp:7ffd84aaadf0 error:0 >Jul 05 15:20:15 m72e gsd-account[24723]: Settings schema 'org.gnome.settings-daemon.plugins.account' is not installed >Jul 05 15:20:15 m72e gsd-xsettings[24737]: Failed to get current display configuration state: GDBus.Error:org.freedesktop.DBus.Error.NameHasNoOwner: Name "org.gnome.Mutter.DisplayConfig" does not exist >Jul 05 15:20:15 m72e kernel: rfkill: input handler disabled >Jul 05 15:20:15 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.NetworkManager' unit='dbus-org.freedesktop.NetworkManager.service' >Jul 05 15:20:15 m72e dbus[753]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.NetworkManager.service': Unit not found. >Jul 05 15:20:15 m72e gsd-rfkill[24730]: Failed to acquire NetworkManager proxy: Error calling StartServiceByName for org.freedesktop.NetworkManager: GDBus.Error:org.freedesktop.systemd1.NoSuchUnit: Unit not found. >Jul 05 15:20:15 m72e gsd-housekeepin[24777]: Loading NVML: libnvidia-ml.so: cannot open shared object file: No such file or directory >Jul 05 15:20:15 m72e abrt-hook-ccpp[24795]: Process 24723 (gsd-account) of user 13349 killed by SIGTRAP - dumping core >Jul 05 15:20:16 m72e gnome-session[24361]: gnome-session-binary[24361]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 15:20:16 m72e gnome-session-binary[24361]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 15:20:16 m72e gsd-account[24832]: Settings schema 'org.gnome.settings-daemon.plugins.account' is not installed >Jul 05 15:20:16 m72e kernel: traps: gsd-account[24832] trap int3 ip:7f99267fcb11 sp:7ffc0b94ac80 error:0 >Jul 05 15:20:16 m72e setroubleshoot[24036]: SELinux is preventing /usr/libexec/gdm-session-worker from write access on the directory gdm. For complete SELinux messages run: sealert -l 62b4a3f6-9761-4f8f-9235-10f811608807 >Jul 05 15:20:16 m72e python[24036]: SELinux is preventing /usr/libexec/gdm-session-worker from write access on the directory gdm. > > ***** Plugin catchall_labels (83.8 confidence) suggests ******************* > > If you want to allow gdm-session-worker to have write access on the gdm directory > Then you need to change the label on gdm > Do > # semanage fcontext -a -t FILE_TYPE 'gdm' > where FILE_TYPE is one of the following: abrt_var_cache_t, admin_home_t, alsa_home_t, antivirus_home_t, audio_home_t, auth_cache_t, auth_home_t, cache_home_t, cgroup_t, chrome_sandbox_home_t, config_home_t, container_home_t, cvs_home_t, data_home_t, dbus_home_t, etc_t, faillog_t, fetchmail_home_t, fonts_cache_t, gconf_home_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, gnome_home_t, gpg_secret_t, gstreamer_home_t, home_bin_t, home_cert_t, httpd_user_content_t, httpd_user_script_exec_t, icc_data_home_t, iceauth_home_t, init_var_run_t, irc_home_t, irc_tmp_t, irssi_home_t, kismet_home_t, krb5_home_t, krb5_host_rcache_t, local_login_home_t, locale_t, mail_home_rw_t, mail_home_t, mandb_home_t, mozilla_home_t, mozilla_plugin_rw_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mpd_home_t, mpd_user_data_t, mplayer_home_t, mysqld_home_t, openshift_var_lib_t, pam_var_console_t, pam_var_run_t, polipo_cache_home_t, polipo_config_home_t, procmail_home_t, pulseaudio_home_t, rlogind_home_t, root_t, rssh_ro_t, rssh_rw_t, sandbox_file_t, screen_home_t, spamc_home_t, speech-dispatcher_home_t, ssh_home_t, svirt_home_t, systemd_home_t, systemd_passwd_var_run_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_sunshine_home_t, texlive_home_t, thumb_home_t, tmp_t, tmpfs_t, tvtime_home_t, uml_ro_t, uml_rw_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_dir_t, user_home_t, user_tmp_t, usr_t, var_auth_t, var_lib_t, var_lock_t, var_log_t, var_run_t, var_spool_t, var_t, virt_content_t, virt_home_t, vmware_conf_t, vmware_file_t, wine_home_t, wireshark_home_t, xauth_home_t, xdm_home_t, xdm_log_t, xdm_rw_etc_t, xdm_spool_t, xdm_tmpfs_t, xdm_var_lib_t, xdm_var_run_t, xkb_var_lib_t, xserver_log_t. > Then execute: > restorecon -v 'gdm' > > > ***** Plugin catchall (17.1 confidence) suggests ************************** > > If you believe that gdm-session-worker should be allowed write access on the gdm directory by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdm-session-wor' --raw | audit2allow -M my-gdmsessionwor > # semodule -i my-gdmsessionwor.pp > >Jul 05 15:20:16 m72e abrt-hook-ccpp[24836]: Process 24832 (gsd-account) of user 13349 killed by SIGTRAP - ignoring (repeated crash) >Jul 05 15:20:16 m72e gnome-session-binary[24361]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 15:20:16 m72e gnome-session[24361]: gnome-session-binary[24361]: WARNING: Application 'org.gnome.SettingsDaemon.Account.desktop' killed by signal 5 >Jul 05 15:20:16 m72e gnome-session[24361]: gnome-session-binary[24361]: WARNING: App 'org.gnome.SettingsDaemon.Account.desktop' respawning too quickly >Jul 05 15:20:16 m72e gnome-session[24361]: gnome-session-binary[24361]: WARNING: Error on restarting session managed app: Component 'org.gnome.SettingsDaemon.Account.desktop' crashing too quickly >Jul 05 15:20:16 m72e gnome-session-binary[24361]: WARNING: App 'org.gnome.SettingsDaemon.Account.desktop' respawning too quickly >Jul 05 15:20:16 m72e gnome-session-binary[24361]: WARNING: Error on restarting session managed app: Component 'org.gnome.SettingsDaemon.Account.desktop' crashing too quickly >Jul 05 15:20:16 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc: Permission denied >Jul 05 15:20:16 m72e gsd-color[24773]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc: Permission denied >Jul 05 15:20:16 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc: Permission denied >Jul 05 15:20:16 m72e gsd-color[24773]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc: Permission denied >Jul 05 15:20:16 m72e gsd-media-keys[24784]: g_variant_get_va: assertion 'value != NULL' failed >Jul 05 15:20:16 m72e gsd-media-keys[24784]: g_variant_unref: assertion 'value != NULL' failed >Jul 05 15:20:16 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc: Permission denied >Jul 05 15:20:16 m72e gsd-color[24773]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc: Permission denied >Jul 05 15:20:16 m72e abrt-server[24833]: Duplicate: core backtrace >Jul 05 15:20:16 m72e abrt-server[24833]: DUP_OF_DIR: /var/spool/abrt/ccpp-2018-07-02-09:55:59-10206 >Jul 05 15:20:16 m72e abrt-server[24833]: Deleting problem directory ccpp-2018-07-05-15:20:15-24723 (dup of ccpp-2018-07-02-09:55:59-10206) >Jul 05 15:20:16 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc: Permission denied >Jul 05 15:20:16 m72e gsd-color[24773]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc: Permission denied >Jul 05 15:20:16 m72e colord[1456]: CdMain: failed to profile from filename: failed to load file: Error opening file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc: Permission denied >Jul 05 15:20:16 m72e gsd-color[24773]: failed to load file: Error opening file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc: Permission denied >Jul 05 15:20:16 m72e gnome-shell[24592]: JS WARNING: [resource:///org/gnome/shell/ui/workspaceThumbnail.js 887]: reference to undefined property "_switchWorkspaceNotifyId" >Jul 05 15:20:16 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 15:20:16 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 15:20:16 m72e dbus[753]: [system] Activating service name='org.freedesktop.problems' (using servicehelper) >Jul 05 15:20:16 m72e dbus[753]: [system] Activated service 'org.freedesktop.problems' failed: Process org.freedesktop.problems received signal 9 >Jul 05 15:20:16 m72e abrt-server[24833]: Email address of sender was not specified. Would you like to do so now? If not, 'user@localhost' is to be used [y/N] >Jul 05 15:20:16 m72e abrt-server[24833]: Email address of receiver was not specified. Would you like to do so now? If not, 'root@localhost' is to be used [y/N] >Jul 05 15:20:16 m72e abrt-server[24833]: Sending an email... >Jul 05 15:20:16 m72e abrt-server[24833]: Sending a notification email to: root@localhost >Jul 05 15:20:16 m72e abrt-server[24833]: send-mail: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 15:20:16 m72e postfix/sendmail[24866]: warning: command "/usr/sbin/postdrop -r" exited with status 9 >Jul 05 15:20:16 m72e abrt-server[24833]: send-mail: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 15:20:16 m72e postfix/sendmail[24866]: fatal: user@localhost(0): unable to execute /usr/sbin/postdrop -r: Success >Jul 05 15:20:16 m72e abrt-server[24833]: Error running '/bin/mailx' >Jul 05 15:20:16 m72e setroubleshoot[24036]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. For complete SELinux messages run: sealert -l 6669b36f-d550-4692-840a-03526ca0d447 >Jul 05 15:20:16 m72e python[24036]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gsd-account file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 15:20:16 m72e setroubleshoot[24036]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. For complete SELinux messages run: sealert -l 6669b36f-d550-4692-840a-03526ca0d447 >Jul 05 15:20:16 m72e python[24036]: SELinux is preventing /usr/libexec/abrt-hook-ccpp from map access on the file /usr/libexec/gsd-account. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-hook-ccpp should be allowed map access on the gsd-account file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-hook-ccpp' --raw | audit2allow -M my-abrthookccpp > # semodule -i my-abrthookccpp.pp > >Jul 05 15:20:16 m72e gnome-shell[24592]: Failed to load background 'file:///usr/share/backgrounds/gnome/adwaita-lock.jpg': Error opening file /usr/share/backgrounds/gnome/adwaita-lock.jpg: No such file or directory >Jul 05 15:20:16 m72e setroubleshoot[24036]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 15:20:16 m72e python[24036]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-0bac1383fb4abc86437df0bfd31023b9.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-0bac1383fb4abc86437df0bfd31023b9.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-0bac1383fb4abc86437df0bfd31023b9.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 15:20:17 m72e gnome-shell[24592]: Error looking up permission: GDBus.Error:org.freedesktop.portal.Error.NotFound: No entry for geolocation >Jul 05 15:20:17 m72e setroubleshoot[24036]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 15:20:17 m72e python[24036]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-0c2d933e282feb5e95379b2caa320512.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-0c2d933e282feb5e95379b2caa320512.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-0c2d933e282feb5e95379b2caa320512.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 15:20:17 m72e setroubleshoot[24036]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 15:20:17 m72e python[24036]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-425bbe74e56050940c54b0f2931c5aec.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-425bbe74e56050940c54b0f2931c5aec.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-425bbe74e56050940c54b0f2931c5aec.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 15:20:17 m72e setroubleshoot[24036]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 15:20:17 m72e python[24036]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-9d03684165204e087fc5b6a268ff58f2.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-9d03684165204e087fc5b6a268ff58f2.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-9d03684165204e087fc5b6a268ff58f2.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 15:20:17 m72e setroubleshoot[24036]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc. For complete SELinux messages run: sealert -l a0d8df06-fc73-48cd-b84c-904df0042b84 >Jul 05 15:20:17 m72e python[24036]: SELinux is preventing /usr/libexec/colord from read access on the file /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc. > > ***** Plugin restorecon (94.8 confidence) suggests ************************ > > If you want to fix the label. > /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc default label should be icc_data_home_t. > Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. > Do > # /sbin/restorecon -v /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc > > ***** Plugin catchall_labels (5.21 confidence) suggests ******************* > > If you want to allow colord to have read access on the edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc file > Then you need to change the label on /home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc > Do > # semanage fcontext -a -t FILE_TYPE '/home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc' > where FILE_TYPE is one of the following: NetworkManager_tmp_t, abrt_helper_exec_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, admin_crontab_tmp_t, afs_cache_t, alsa_home_t, alsa_tmp_t, amanda_tmp_t, antivirus_home_t, antivirus_tmp_t, apcupsd_tmp_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_tmp_t, audio_home_t, auditadm_sudo_tmp_t, auth_home_t, autofs_t, automount_tmp_t, awstats_tmp_t, bacula_tmp_t, bin_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_project_tmp_t, boinc_tmp_t, boot_t, bootloader_tmp_t, bugzilla_tmp_t, cache_home_t, cardmgr_dev_t, ccs_tmp_t, cdcc_tmp_t, cert_t, cgroup_t, chrome_sandbox_home_t, chrome_sandbox_tmp_t, cifs_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cluster_conf_t, cluster_tmp_t, cluster_var_lib_t, cluster_var_run_t, cobbler_tmp_t, cockpit_tmp_t, collectd_script_tmp_t, colord_exec_t, colord_tmp_t, colord_tmpfs_t, colord_var_lib_t, comsat_tmp_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, config_home_t, conman_tmp_t, container_file_t, container_home_t, container_runtime_tmp_t, couchdb_tmp_t, cpu_online_t, crack_tmp_t, crond_tmp_t, crontab_tmp_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_etc_t, cupsd_lpd_tmp_t, cupsd_rw_etc_t, cupsd_tmp_t, cvs_home_t, cvs_tmp_t, cyphesis_tmp_t, cyrus_tmp_t, data_home_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dbus_home_t, dbusd_etc_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_tmp_t, deltacloudd_tmp_t, devicekit_tmp_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_tmp_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dnssec_trigger_tmp_t, dosfs_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, drbd_tmp_t, ecryptfs_t, efivarfs_t, etc_runtime_t, etc_t, exim_tmp_t, fail2ban_tmp_t, fail2ban_var_lib_t, fenced_tmp_t, fetchmail_home_t, file_context_t, firewalld_tmp_t, firewallgui_tmp_t, fonts_cache_t, fonts_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, fusefs_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, gconf_home_t, gconf_tmp_t, geoclue_tmp_t, getty_tmp_t, git_script_tmp_t, git_user_content_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, glance_registry_tmp_t, glance_tmp_t, glusterd_tmp_t, gnome_home_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpg_secret_t, gpm_tmp_t, gssd_tmp_t, gstreamer_home_t, home_bin_t, home_cert_t, hostname_etc_t, hsqldb_tmp_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icc_data_home_t, iceauth_home_t, ifconfig_exec_t, inetd_child_tmp_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, ipa_tmp_t, ipsec_tmp_t, iptables_tmp_t, irc_home_t, irc_tmp_t, irssi_home_t, iscsi_tmp_t, iso9660_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_tmp_t, kismet_home_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_conf_t, krb5_home_t, krb5_host_rcache_t, krb5kdc_tmp_t, ktalkd_tmp_t, l2tpd_tmp_t, ld_so_cache_t, ld_so_t, ldconfig_tmp_t, lib_t, livecd_tmp_t, local_login_home_t, locale_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, machineid_t, mail_home_rw_t, mail_home_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_mail_tmp_t, mailman_queue_tmp_t, man_cache_t, man_t, mandb_cache_t, mandb_home_t, mdadm_tmp_t, mediawiki_tmp_t, mock_tmp_t, mojomojo_tmp_t, mongod_tmp_t, mount_tmp_t, mozilla_home_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_home_t, mpd_tmp_t, mpd_user_data_t, mplayer_home_t, mplayer_tmpfs_t, mscan_tmp_t, munin_script_tmp_t, munin_tmp_t, mysqld_home_t, mysqld_tmp_t, nagios_eventhandler_plugin_tmp_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_tmp_t, net_conf_t, netutils_tmp_t, neutron_tmp_t, nfs_t, nova_tmp_t, nsd_tmp_t, ntop_tmp_t, ntpd_tmp_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_tmp_t, openshift_var_lib_t, openvpn_tmp_t, openvswitch_tmp_t, openwsman_tmp_t, oracleasm_tmp_t, pam_timestamp_tmp_t, passenger_tmp_t, passwd_file_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, piranha_web_tmp_t, pkcs_slotd_tmp_t, pki_tomcat_tmp_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_auth_exec_t, policykit_reload_t, policykit_tmp_t, policykit_var_lib_t, polipo_cache_home_t, polipo_config_home_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_tmp_t, pppd_tmp_t, prelink_exec_t, prelink_tmp_t, prelude_lml_tmp_t, proc_t, procmail_home_t, procmail_tmp_t, prosody_tmp_t, psad_tmp_t, pulseaudio_home_t, pulseaudio_tmpfs_t, puppet_tmp_t, puppetmaster_tmp_t, qpidd_tmp_t, racoon_tmp_t, realmd_tmp_t, removable_t, rhev_agentd_tmp_t, rhsmcertd_tmp_t, ricci_tmp_t, rlogind_home_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_script_tmp_t, rpm_tmp_t, rssh_ro_t, rssh_rw_t, rsync_tmp_t, rtas_errd_tmp_t, samba_etc_t, samba_net_tmp_t, samba_var_t, sandbox_file_t, sbd_tmpfs_t, sblim_tmp_t, screen_home_t, secadm_sudo_tmp_t, sectool_tmp_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_tmp_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, sge_tmp_t, shell_exec_t, shorewall_tmp_t, slapd_tmp_t, smbd_tmp_t, smoltclient_tmp_t, smsd_tmp_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_home_t, spamc_tmp_t, spamd_tmp_t, speech-dispatcher_home_t, speech-dispatcher_tmp_t, squid_tmp_t, squirrelmail_spool_t, src_t, ssh_agent_tmp_t, ssh_home_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_public_t, sssd_var_lib_t, staff_sudo_tmp_t, stapserver_tmp_t, stunnel_tmp_t, svirt_home_t, svirt_tmp_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, sysfs_t, syslogd_tmp_t, system_conf_t, system_cronjob_tmp_t, system_cronjob_var_lib_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_home_t, systemd_hwdb_etc_t, systemd_logind_sessions_t, sysv_t, targetd_tmp_t, tcpd_tmp_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_logger_tmp_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_home_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, texlive_home_t, textrel_shlib_t, tgtd_tmp_t, thumb_home_t, thumb_tmp_t, tmp_t, tomcat_tmp_t, tuned_tmp_t, tvtime_home_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, udev_var_run_t, uml_ro_t, uml_rw_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, usbfs_t, user_cron_spool_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, usr_t, uucpd_tmp_t, var_spool_t, varnishd_tmp_t, virt_content_t, virt_home_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmblock_t, vmtools_tmp_t, vmware_conf_t, vmware_file_t, vmware_host_tmp_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, vxfs_t, w3c_validator_tmp_t, webadm_tmp_t, webalizer_tmp_t, wine_home_t, wireshark_home_t, wireshark_tmp_t, wireshark_tmpfs_t, xauth_home_t, xauth_tmp_t, xdm_home_t, xdm_var_lib_t, xdm_var_run_t, xend_tmp_t, xenfs_t, xenstored_tmp_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_tmp_t, zarafa_deliver_tmp_t, zarafa_indexer_tmp_t, zarafa_server_tmp_t, zarafa_var_lib_t, zebra_tmp_t, zoneminder_tmpfs_t. > Then execute: > restorecon -v '/home/whot/.local/share/icc/edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc' > > > ***** Plugin catchall (1.44 confidence) suggests ************************** > > If you believe that colord should be allowed read access on the edid-bf3ca751d8645b5f53d88fe7adcb98b2.icc file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus > # semodule -i my-gdbus.pp > >Jul 05 15:20:17 m72e gnome-shell[24592]: GNOME Shell started at Thu Jul 05 2018 15:20:15 GMT+1000 (AEST) >Jul 05 15:20:17 m72e org.gnome.Shell.desktop[24592]: Window manager warning: "XF86RFKill" is not a valid accelerator >Jul 05 15:20:18 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: Unable to bind hide_window key, another instance/window has it. >Jul 05 15:20:18 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 15:20:18 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 15:20:18 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 15:20:19 m72e setroubleshoot[24036]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 15:20:19 m72e python[24036]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 15:20:20 m72e telepathy-haze[24694]: Exiting >Jul 05 15:20:21 m72e setroubleshoot[24036]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. For complete SELinux messages run: sealert -l 62f43977-2a39-4ee8-b3ef-f2a414f8aa9b >Jul 05 15:20:21 m72e python[24036]: SELinux is preventing /usr/sbin/abrt-dbus from map access on the file /usr/sbin/abrt-dbus. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that abrt-dbus should be allowed map access on the abrt-dbus file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'abrt-dbus' --raw | audit2allow -M my-abrtdbus > # semodule -i my-abrtdbus.pp > >Jul 05 15:20:21 m72e setroubleshoot[24036]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. For complete SELinux messages run: sealert -l c2670567-6ce1-42fd-bb01-7cdf552b3c40 >Jul 05 15:20:21 m72e python[24036]: SELinux is preventing /usr/sbin/postdrop from map access on the file /usr/sbin/postdrop. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that postdrop should be allowed map access on the postdrop file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # ausearch -c 'postdrop' --raw | audit2allow -M my-postdrop > # semodule -i my-postdrop.pp > >Jul 05 15:20:32 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: Unable to bind hide_window key, another instance/window has it. >Jul 05 15:20:32 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 15:20:32 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 15:20:32 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 15:20:33 m72e systemd-logind[774]: Removed session c5. >Jul 05 15:20:33 m72e systemd[1]: Removed slice User Slice of gdm. >Jul 05 15:20:34 m72e dbus[753]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Jul 05 15:20:34 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:11] Failed to parse protect system value, ignoring: strict >Jul 05 15:20:34 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:12] Unknown lvalue 'ProtectKernelTunables' in section 'Service' >Jul 05 15:20:34 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:13] Unknown lvalue 'ProtectControlGroups' in section 'Service' >Jul 05 15:20:34 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:14] Unknown lvalue 'ReadWritePaths' in section 'Service' >Jul 05 15:20:34 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:23] Unknown lvalue 'MemoryDenyWriteExecute' in section 'Service' >Jul 05 15:20:34 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:26] Unknown lvalue 'ProtectKernelModules' in section 'Service' >Jul 05 15:20:34 m72e systemd[1]: [/usr/lib/systemd/system/fprintd.service:29] Unknown lvalue 'RestrictRealtime' in section 'Service' >Jul 05 15:20:34 m72e systemd[1]: Starting Fingerprint Authentication Daemon... >Jul 05 15:20:34 m72e dbus[753]: [system] Successfully activated service 'net.reactivated.Fprint' >Jul 05 15:20:34 m72e systemd[1]: Started Fingerprint Authentication Daemon. >Jul 05 15:20:36 m72e sudo[25090]: whot : TTY=pts/1 ; PWD=/home/whot ; USER=root ; COMMAND=/bin/yum update >Jul 05 15:20:39 m72e dbus[753]: [system] Failed to activate service 'org.bluez': timed out >Jul 05 15:20:39 m72e pulseaudio[24602]: [pulseaudio] bluez5-util.c: GetManagedObjects() failed: org.freedesktop.DBus.Error.NoReply: Did not receive a reply. Possible causes include: the remote application did not send a reply, the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken. >Jul 05 15:21:06 m72e realmd[24311]: quitting realmd service after timeout >Jul 05 15:21:06 m72e realmd[24311]: stopping service >Jul 05 15:21:17 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: Unable to bind hide_window key, another instance/window has it. >Jul 05 15:21:17 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 15:21:17 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 15:21:17 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 15:21:23 m72e org.gnome.Shell.desktop[24592]: Window manager warning: Buggy client sent a _NET_ACTIVE_WINDOW message with a timestamp of 0 for 0x2800010 (Mozilla Fi) >Jul 05 15:21:45 m72e gnome-session[24361]: gnome-session-binary[24361]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' failed to register before timeout >Jul 05 15:21:45 m72e gnome-session-binary[24361]: WARNING: Application 'org.gnome.SettingsDaemon.DiskUtilityNotify.desktop' failed to register before timeout >Jul 05 15:21:45 m72e gnome-session-binary[24361]: Entering running state >Jul 05 15:21:45 m72e vmware-user.desktop[25800]: vmware-user: could not open /proc/fs/vmblock/dev >Jul 05 15:21:46 m72e libcanberra-login-sound.desktop[25803]: Failed to play sound: File or data not found >Jul 05 15:21:46 m72e com.redhat.imsettings[24372]: [ 1530768106.179296]: IMSettings-Daemon[24441]: INFO: Attempting to switch IM to none [lang=en_AU.utf8, update=false] >Jul 05 15:21:46 m72e gnome-shell[24592]: STACK_OP_ADD: window 0x3c00001 already in stack >Jul 05 15:21:46 m72e gnome-shell[24592]: STACK_OP_ADD: window 0x3c00001 already in stack >Jul 05 15:21:46 m72e com.redhat.imsettings[24372]: No such schema âorg.gnome.settings-daemon.plugins.keyboardâ >Jul 05 15:21:46 m72e com.redhat.imsettings[24372]: [ 1530768106.294939]: IMSettings-Daemon[24441]: WARNING **: Current desktop isn't targeted by IMSettings. >Jul 05 15:21:46 m72e imsettings-start.desktop[25798]: GDBus.Error:org.gtk.GDBus.UnmappedGError.Quark._imsettings_2derror_2dquark.Code5: Current desktop isn't targeted by IMSettings. >Jul 05 15:21:46 m72e com.redhat.imsettings[24372]: Exiting... >Jul 05 15:21:46 m72e com.redhat.imsettings[24372]: [ 1530768106.302759]: IMSettings-Daemon[24441]: INFO: Unloading imesttings module: qt >Jul 05 15:21:46 m72e com.redhat.imsettings[24372]: [ 1530768106.302911]: IMSettings-Daemon[24441]: INFO: Unloading imesttings module: gsettings >Jul 05 15:21:46 m72e com.redhat.imsettings[24372]: [ 1530768106.302980]: IMSettings-Daemon[24441]: INFO: imsettings-daemon is shut down. >Jul 05 15:21:46 m72e gnome-shell[24592]: JS WARNING: [/usr/share/gnome-shell/extensions/top-icons@gnome-shell-extensions.gcampax.github.com/extension.js 118]: reference to undefined property "width" >Jul 05 15:21:46 m72e gnome-software[25790]: enabled plugins: desktop-categories, packagekit-local, packagekit-offline, packagekit-proxy, packagekit-refresh, packagekit-upgrade, packagekit, shell-extensions, systemd-updates, packagekit-url-to-app, fwupd, os-release, appstream, steam, desktop-menu-path, flatpak, hardcoded-blacklist, hardcoded-featured, hardcoded-popular, modalias, packagekit-refine, generic-updates, rewrite-resource, icons, odrs, packagekit-history, provenance, repos, key-colors, provenance-license, packagekit-refine-repos, key-colors-metadata >Jul 05 15:21:46 m72e gnome-software[25790]: disabled plugins: dpkg, dummy, fedora-pkgdb-collections, epiphany >Jul 05 15:21:46 m72e gnome-software[25790]: failed to call gs_plugin_add_updates_historical on packagekit-offline: cannot find repo mhlavink-developerdashboard >Jul 05 15:21:50 m72e PackageKit[1849]: get-updates transaction /2414_cadaaeac from uid 13349 finished with success after 3564ms >Jul 05 15:21:50 m72e gnome-software[25790]: hiding category games featured applications: found only 0 to show, need at least 9 >Jul 05 15:21:50 m72e gnome-software[25790]: hiding category audio-video featured applications: found only 0 to show, need at least 9 >Jul 05 15:21:50 m72e gnome-software[25790]: top-icons@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 15:21:50 m72e gnome-software[25790]: apps-menu@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 15:21:50 m72e gnome-software[25790]: window-list@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 15:21:50 m72e gnome-software[25790]: launch-new-instance@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 15:21:50 m72e gnome-software[25790]: places-menu@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 15:21:50 m72e gnome-software[25790]: alternate-tab@gnome-shell-extensions.gcampax.github.com unknown type 3 >Jul 05 15:21:51 m72e PackageKit[1849]: resolve transaction /2415_abacecbb from uid 13349 finished with success after 1026ms >Jul 05 15:21:51 m72e PackageKit[1849]: resolve transaction /2416_aebaabaa from uid 13349 finished with success after 54ms >Jul 05 15:21:51 m72e PackageKit[1849]: resolve transaction /2417_ecdccacd from uid 13349 finished with success after 39ms >Jul 05 15:21:51 m72e gnome-software[25790]: Only 5 apps for popular list, hiding >Jul 05 15:21:51 m72e PackageKit[1849]: resolve transaction /2418_bccbeeed from uid 13349 finished with success after 45ms >Jul 05 15:21:52 m72e PackageKit[1849]: resolve transaction /2419_aedcbedb from uid 13349 finished with success after 142ms >Jul 05 15:21:54 m72e PackageKit[1849]: get-update-detail transaction /2420_abdbbdbd from uid 13349 finished with success after 2821ms >Jul 05 15:21:54 m72e PackageKit[1849]: search-file transaction /2421_abaeabce from uid 13349 finished with success after 15ms >Jul 05 15:21:54 m72e gnome-software[25790]: Failed to find one package for vmware-player.desktop, /usr/share/applications/vmware-player.desktop, [0] >Jul 05 15:21:55 m72e PackageKit[1849]: search-file transaction /2422_aecdccad from uid 13349 finished with success after 48ms >Jul 05 15:21:55 m72e PackageKit[1849]: search-file transaction /2423_aaaeeccd from uid 13349 finished with success after 48ms >Jul 05 15:21:55 m72e PackageKit[1849]: search-file transaction /2424_babbebbc from uid 13349 finished with success after 47ms >Jul 05 15:21:55 m72e PackageKit[1849]: search-file transaction /2425_bedddccb from uid 13349 finished with success after 48ms >Jul 05 15:21:55 m72e PackageKit[1849]: search-file transaction /2426_ceddadbe from uid 13349 finished with success after 46ms >Jul 05 15:21:55 m72e PackageKit[1849]: search-file transaction /2427_cabddbdb from uid 13349 finished with success after 47ms >Jul 05 15:21:55 m72e PackageKit[1849]: search-file transaction /2428_adedeada from uid 13349 finished with success after 47ms >Jul 05 15:21:56 m72e PackageKit[1849]: search-file transaction /2429_bacececc from uid 13349 finished with success after 48ms >Jul 05 15:21:56 m72e PackageKit[1849]: search-file transaction /2430_abdccacc from uid 13349 finished with success after 47ms >Jul 05 15:21:56 m72e PackageKit[1849]: search-file transaction /2431_acbedaba from uid 13349 finished with success after 46ms >Jul 05 15:21:56 m72e PackageKit[1849]: search-file transaction /2432_cbeebdaa from uid 13349 finished with success after 47ms >Jul 05 15:21:56 m72e PackageKit[1849]: search-file transaction /2433_bcebbcae from uid 13349 finished with success after 47ms >Jul 05 15:21:56 m72e PackageKit[1849]: search-file transaction /2434_dccdccbc from uid 13349 finished with success after 47ms >Jul 05 15:21:56 m72e PackageKit[1849]: search-file transaction /2435_eadecccd from uid 13349 finished with success after 46ms >Jul 05 15:21:56 m72e PackageKit[1849]: search-file transaction /2436_bcdabeee from uid 13349 finished with success after 47ms >Jul 05 15:21:56 m72e PackageKit[1849]: search-file transaction /2437_daceccdb from uid 13349 finished with success after 45ms >Jul 05 15:21:57 m72e PackageKit[1849]: search-file transaction /2438_bccaeedd from uid 13349 finished with success after 47ms >Jul 05 15:21:57 m72e PackageKit[1849]: search-file transaction /2439_eacaaebc from uid 13349 finished with success after 46ms >Jul 05 15:21:57 m72e PackageKit[1849]: search-file transaction /2440_ecdabbab from uid 13349 finished with success after 46ms >Jul 05 15:21:57 m72e PackageKit[1849]: get-details transaction /2441_edadcded from uid 13349 finished with success after 101ms >Jul 05 15:24:51 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: <Window object at 0x7fb448e89f50 (terminatorlib+window+Window at 0x207e0e0)> is not in registered window list >Jul 05 15:24:53 m72e sudo[26071]: whot : TTY=pts/1 ; PWD=/home/whot ; USER=root ; COMMAND=/bin/yum history >Jul 05 15:25:00 m72e sudo[26151]: whot : TTY=pts/1 ; PWD=/home/whot ; USER=root ; COMMAND=/bin/yum history info 334 >Jul 05 15:25:46 m72e dbus[753]: [system] Activating service name='com.redhat.SubscriptionManager' (using servicehelper) >Jul 05 15:25:46 m72e dbus[753]: [system] Successfully activated service 'com.redhat.SubscriptionManager' >Jul 05 15:27:43 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: Unable to bind hide_window key, another instance/window has it. >Jul 05 15:27:43 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: ActivityWatch plug-in unavailable: please install python-notify >Jul 05 15:27:43 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: PluginRegistry::load_plugins: Importing plugin activitywatch.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 15:27:43 m72e org.gnome.SettingsDaemon.MediaKeys.desktop[24784]: PluginRegistry::load_plugins: Importing plugin __init__.py failed: 'module' object has no attribute 'AVAILABLE' >Jul 05 15:30:01 m72e dbus[753]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' >Jul 05 15:30:01 m72e systemd[1]: Starting Hostname Service... >Jul 05 15:30:01 m72e dbus[753]: [system] Successfully activated service 'org.freedesktop.hostname1' >Jul 05 15:30:01 m72e systemd[1]: Started Hostname Service. >Jul 05 15:30:01 m72e systemd[1]: Created slice User Slice of root. >Jul 05 15:30:01 m72e systemd[1]: Started Session 60 of user root. >Jul 05 15:30:01 m72e CROND[26447]: (root) CMD (/usr/lib64/sa/sa1 1 1) >Jul 05 15:30:01 m72e systemd[1]: Removed slice User Slice of root. >Jul 05 15:31:31 m72e sudo[26542]: whot : TTY=pts/1 ; PWD=/home/whot ; USER=root ; COMMAND=/bin/yum distro-sync
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1598308
:
1456658
| 1456660