Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 951626 Details for
Bug 1158310
Error "sr 0:0:1:0: rejecting I/O to offline device" when eject cdrom
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
messages of guest
messages (text/plain), 1.44 MB, created by
CongLi
on 2014-10-29 04:47:02 UTC
(
hide
)
Description:
messages of guest
Filename:
MIME Type:
Creator:
CongLi
Created:
2014-10-29 04:47:02 UTC
Size:
1.44 MB
patch
obsolete
>Oct 28 20:40:08 unused rsyslogd: [origin software="rsyslogd" swVersion="7.4.7" x-pid="649" x-info="http://www.rsyslog.com"] start >Oct 28 20:39:39 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 28 20:39:39 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 28 20:39:39 unused kernel: Initializing cgroup subsys cpuset >Oct 28 20:39:39 unused kernel: Initializing cgroup subsys cpu >Oct 28 20:39:39 unused kernel: Initializing cgroup subsys cpuacct >Oct 28 20:39:39 unused kernel: Linux version 3.10.0-175.el7.x86_64 (mockbuild@x86-018.build.eng.bos.redhat.com) (gcc version 4.8.3 20140911 (Red Hat 4.8.3-7) (GCC) ) #1 SMP Tue Sep 30 02:14:47 EDT 2014 >Oct 28 20:39:39 unused kernel: Command line: BOOT_IMAGE=/vmlinuz-3.10.0-175.el7.x86_64 root=/dev/mapper/rhel_unused-root ro crashkernel=auto rd.lvm.lv=rhel_unused/root rd.lvm.lv=rhel_unused/swap console=tty0 console=ttyS0,115200 LANG=en_US.UTF-8 >Oct 28 20:39:39 unused kernel: e820: BIOS-provided physical RAM map: >Oct 28 20:39:39 unused kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable >Oct 28 20:39:39 unused kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved >Oct 28 20:39:39 unused kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved >Oct 28 20:39:39 unused kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdffff] usable >Oct 28 20:39:39 unused kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved >Oct 28 20:39:39 unused kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved >Oct 28 20:39:39 unused kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved >Oct 28 20:39:39 unused kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable >Oct 28 20:39:39 unused kernel: NX (Execute Disable) protection: active >Oct 28 20:39:39 unused kernel: SMBIOS 2.8 present. >Oct 28 20:39:39 unused kernel: Hypervisor detected: KVM >Oct 28 20:39:39 unused kernel: No AGP bridge found >Oct 28 20:39:39 unused kernel: e820: last_pfn = 0x140000 max_arch_pfn = 0x400000000 >Oct 28 20:39:39 unused kernel: x86 PAT enabled: cpu 0, old 0x7040600070406, new 0x7010600070106 >Oct 28 20:39:39 unused kernel: e820: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 >Oct 28 20:39:39 unused kernel: found SMP MP-table at [mem 0x000f2030-0x000f203f] mapped at [ffff8800000f2030] >Oct 28 20:39:39 unused kernel: init_memory_mapping: [mem 0x00000000-0x000fffff] >Oct 28 20:39:39 unused kernel: init_memory_mapping: [mem 0x13fe00000-0x13fffffff] >Oct 28 20:39:39 unused kernel: init_memory_mapping: [mem 0x13c000000-0x13fdfffff] >Oct 28 20:39:39 unused kernel: init_memory_mapping: [mem 0x100000000-0x13bffffff] >Oct 28 20:39:39 unused kernel: init_memory_mapping: [mem 0x00100000-0xbffdffff] >Oct 28 20:39:39 unused kernel: RAMDISK: [mem 0x35c37000-0x36e13fff] >Oct 28 20:39:39 unused kernel: Reserving 161MB of memory at 688MB for crashkernel (System RAM: 4095MB) >Oct 28 20:39:39 unused kernel: ACPI: RSDP 00000000000f1d90 00014 (v00 BOCHS ) >Oct 28 20:39:39 unused kernel: ACPI: RSDT 00000000bffe1931 00030 (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001) >Oct 28 20:39:39 unused kernel: ACPI: FACP 00000000bffe0b37 00074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001) >Oct 28 20:39:39 unused kernel: ACPI: DSDT 00000000bffe0040 00AF7 (v01 BOCHS BXPCDSDT 00000001 BXPC 00000001) >Oct 28 20:39:39 unused kernel: ACPI: FACS 00000000bffe0000 00040 >Oct 28 20:39:39 unused kernel: ACPI: SSDT 00000000bffe0bab 00CF6 (v01 BOCHS BXPCSSDT 00000001 BXPC 00000001) >Oct 28 20:39:39 unused kernel: ACPI: APIC 00000000bffe18a1 00090 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001) >Oct 28 20:39:39 unused kernel: No NUMA configuration found >Oct 28 20:39:39 unused kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] >Oct 28 20:39:39 unused kernel: Initmem setup node 0 [mem 0x00000000-0x13fffffff] >Oct 28 20:39:39 unused kernel: NODE_DATA [mem 0x13ffd6000-0x13fffcfff] >Oct 28 20:39:39 unused kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 >Oct 28 20:39:39 unused kernel: kvm-clock: cpu 0, msr 1:3ff86001, primary cpu clock >Oct 28 20:39:39 unused kernel: Zone ranges: >Oct 28 20:39:39 unused kernel: DMA [mem 0x00001000-0x00ffffff] >Oct 28 20:39:39 unused kernel: DMA32 [mem 0x01000000-0xffffffff] >Oct 28 20:39:39 unused kernel: Normal [mem 0x100000000-0x13fffffff] >Oct 28 20:39:39 unused kernel: Movable zone start for each node >Oct 28 20:39:39 unused kernel: Early memory node ranges >Oct 28 20:39:39 unused kernel: node 0: [mem 0x00001000-0x0009efff] >Oct 28 20:39:39 unused kernel: node 0: [mem 0x00100000-0xbffdffff] >Oct 28 20:39:39 unused kernel: node 0: [mem 0x100000000-0x13fffffff] >Oct 28 20:39:39 unused kernel: ACPI: PM-Timer IO Port: 0x608 >Oct 28 20:39:39 unused kernel: ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled) >Oct 28 20:39:39 unused kernel: ACPI: LAPIC (acpi_id[0x01] lapic_id[0x01] enabled) >Oct 28 20:39:39 unused kernel: ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled) >Oct 28 20:39:39 unused kernel: ACPI: LAPIC (acpi_id[0x03] lapic_id[0x03] enabled) >Oct 28 20:39:39 unused kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) >Oct 28 20:39:39 unused kernel: ACPI: IOAPIC (id[0x00] address[0xfec00000] gsi_base[0]) >Oct 28 20:39:39 unused kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 >Oct 28 20:39:39 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) >Oct 28 20:39:39 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) >Oct 28 20:39:39 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) >Oct 28 20:39:39 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) >Oct 28 20:39:39 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) >Oct 28 20:39:39 unused kernel: Using ACPI (MADT) for SMP configuration information >Oct 28 20:39:39 unused kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs >Oct 28 20:39:39 unused kernel: PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff] >Oct 28 20:39:39 unused kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000effff] >Oct 28 20:39:39 unused kernel: PM: Registered nosave memory: [mem 0x000f0000-0x000fffff] >Oct 28 20:39:39 unused kernel: PM: Registered nosave memory: [mem 0xbffe0000-0xbfffffff] >Oct 28 20:39:39 unused kernel: PM: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] >Oct 28 20:39:39 unused kernel: PM: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] >Oct 28 20:39:39 unused kernel: PM: Registered nosave memory: [mem 0xff000000-0xfffbffff] >Oct 28 20:39:39 unused kernel: PM: Registered nosave memory: [mem 0xfffc0000-0xffffffff] >Oct 28 20:39:39 unused kernel: e820: [mem 0xc0000000-0xfeffbfff] available for PCI devices >Oct 28 20:39:39 unused kernel: Booting paravirtualized kernel on KVM >Oct 28 20:39:39 unused kernel: setup_percpu: NR_CPUS:5120 nr_cpumask_bits:4 nr_cpu_ids:4 nr_node_ids:1 >Oct 28 20:39:39 unused kernel: PERCPU: Embedded 29 pages/cpu @ffff88013fc00000 s86656 r8192 d23936 u524288 >Oct 28 20:39:39 unused kernel: KVM setup async PF for cpu 0 >Oct 28 20:39:39 unused kernel: kvm-stealtime: cpu 0, msr 13fc0e000 >Oct 28 20:39:39 unused kernel: Built 1 zonelists in Node order, mobility grouping on. Total pages: 1032041 >Oct 28 20:39:39 unused kernel: Policy zone: Normal >Oct 28 20:39:39 unused kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-3.10.0-175.el7.x86_64 root=/dev/mapper/rhel_unused-root ro crashkernel=auto rd.lvm.lv=rhel_unused/root rd.lvm.lv=rhel_unused/swap console=tty0 console=ttyS0,115200 LANG=en_US.UTF-8 >Oct 28 20:39:39 unused kernel: PID hash table entries: 4096 (order: 3, 32768 bytes) >Oct 28 20:39:39 unused kernel: xsave: enabled xstate_bv 0x7, cntxt size 0x340 >Oct 28 20:39:39 unused kernel: Checking aperture... >Oct 28 20:39:39 unused kernel: No AGP bridge found >Oct 28 20:39:39 unused kernel: Memory: 3863044k/5242880k available (6216k kernel code, 1049096k absent, 330740k reserved, 4153k data, 1604k init) >Oct 28 20:39:39 unused kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 >Oct 28 20:39:39 unused kernel: Hierarchical RCU implementation. >Oct 28 20:39:39 unused kernel: RCU restricting CPUs from NR_CPUS=5120 to nr_cpu_ids=4. >Oct 28 20:39:39 unused kernel: Experimental no-CBs for all CPUs >Oct 28 20:39:39 unused kernel: Experimental no-CBs CPUs: 0-3. >Oct 28 20:39:39 unused kernel: NR_IRQS:327936 nr_irqs:712 16 >Oct 28 20:39:39 unused kernel: Console: colour VGA+ 80x25 >Oct 28 20:39:39 unused kernel: console [tty0] enabled >Oct 28 20:39:39 unused kernel: console [ttyS0] enabled >Oct 28 20:39:39 unused kernel: allocated 16777216 bytes of page_cgroup >Oct 28 20:39:39 unused kernel: please try 'cgroup_disable=memory' option if you don't want memory cgroups >Oct 28 20:39:39 unused kernel: tsc: Detected 1999.999 MHz processor >Oct 28 20:39:39 unused kernel: Calibrating delay loop (skipped) preset value.. 3999.99 BogoMIPS (lpj=1999999) >Oct 28 20:39:39 unused kernel: pid_max: default: 32768 minimum: 301 >Oct 28 20:39:39 unused kernel: Security Framework initialized >Oct 28 20:39:39 unused kernel: SELinux: Initializing. >Oct 28 20:39:39 unused kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes) >Oct 28 20:39:39 unused kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes) >Oct 28 20:39:39 unused kernel: Mount-cache hash table entries: 4096 >Oct 28 20:39:39 unused kernel: Initializing cgroup subsys memory >Oct 28 20:39:39 unused kernel: Initializing cgroup subsys devices >Oct 28 20:39:39 unused kernel: Initializing cgroup subsys freezer >Oct 28 20:39:39 unused kernel: Initializing cgroup subsys net_cls >Oct 28 20:39:39 unused kernel: Initializing cgroup subsys blkio >Oct 28 20:39:39 unused kernel: Initializing cgroup subsys perf_event >Oct 28 20:39:39 unused kernel: Initializing cgroup subsys hugetlb >Oct 28 20:39:39 unused kernel: CPU: Physical Processor ID: 0 >Oct 28 20:39:39 unused kernel: CPU: Processor Core ID: 0 >Oct 28 20:39:39 unused kernel: mce: CPU supports 10 MCE banks >Oct 28 20:39:39 unused kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 >Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0 >tlb_flushall_shift: 6 >Oct 28 20:39:39 unused kernel: Freeing SMP alternatives: 24k freed >Oct 28 20:39:39 unused kernel: ACPI: Core revision 20130517 >Oct 28 20:39:39 unused kernel: ACPI: All ACPI Tables successfully acquired >Oct 28 20:39:39 unused kernel: ftrace: allocating 23854 entries in 94 pages >Oct 28 20:39:39 unused kernel: Enabling x2apic >Oct 28 20:39:39 unused kernel: Enabled x2apic >Oct 28 20:39:39 unused kernel: Switched APIC routing to physical x2apic. >Oct 28 20:39:39 unused kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 >Oct 28 20:39:39 unused kernel: smpboot: CPU0: Intel Xeon E312xx (Sandy Bridge) (fam: 06, model: 2a, stepping: 01) >Oct 28 20:39:39 unused kernel: Performance Events: unsupported p6 CPU model 42 no PMU driver, software events only. >Oct 28 20:39:39 unused kernel: KVM setup paravirtual spinlock >Oct 28 20:39:39 unused kernel: NMI watchdog: disabled (cpu0): hardware events not enabled >Oct 28 20:39:39 unused kernel: kvm-clock: cpu 1, msr 1:3ff86041, secondary cpu clock >Oct 28 20:39:39 unused kernel: KVM setup async PF for cpu 1 >Oct 28 20:39:39 unused kernel: kvm-stealtime: cpu 1, msr 13fc8e000 >Oct 28 20:39:39 unused kernel: kvm-clock: cpu 2, msr 1:3ff86081, secondary cpu clock >Oct 28 20:39:39 unused kernel: KVM setup async PF for cpu 2 >Oct 28 20:39:39 unused kernel: smpboot: Booting Node 0, Processors #1 #2 #3 OK >Oct 28 20:39:39 unused kernel: kvm-stealtime: cpu 2, msr 13fd0e000 >Oct 28 20:39:39 unused kernel: kvm-clock: cpu 3, msr 1:3ff860c1, secondary cpu clock >Oct 28 20:39:39 unused kernel: Brought up 4 CPUs >Oct 28 20:39:39 unused kernel: KVM setup async PF for cpu 3 >Oct 28 20:39:39 unused kernel: kvm-stealtime: cpu 3, msr 13fd8e000 >Oct 28 20:39:39 unused kernel: smpboot: Total of 4 processors activated (15999.99 BogoMIPS) >Oct 28 20:39:39 unused kernel: devtmpfs: initialized >Oct 28 20:39:39 unused kernel: EVM: security.selinux >Oct 28 20:39:39 unused kernel: EVM: security.ima >Oct 28 20:39:39 unused kernel: EVM: security.capability >Oct 28 20:39:39 unused kernel: atomic64 test passed for x86-64 platform with CX8 and with SSE >Oct 28 20:39:39 unused kernel: NET: Registered protocol family 16 >Oct 28 20:39:39 unused kernel: ACPI: bus type PCI registered >Oct 28 20:39:39 unused kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 >Oct 28 20:39:39 unused kernel: PCI: Using configuration type 1 for base access >Oct 28 20:39:39 unused kernel: ACPI: Added _OSI(Module Device) >Oct 28 20:39:39 unused kernel: ACPI: Added _OSI(Processor Device) >Oct 28 20:39:39 unused kernel: ACPI: Added _OSI(3.0 _SCP Extensions) >Oct 28 20:39:39 unused kernel: ACPI: Added _OSI(Processor Aggregator Device) >Oct 28 20:39:39 unused kernel: ACPI: Interpreter enabled >Oct 28 20:39:39 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S1_] (20130517/hwxface-571) >Oct 28 20:39:39 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S2_] (20130517/hwxface-571) >Oct 28 20:39:39 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S3_] (20130517/hwxface-571) >Oct 28 20:39:39 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S4_] (20130517/hwxface-571) >Oct 28 20:39:39 unused kernel: ACPI: (supports S0 S5) >Oct 28 20:39:39 unused kernel: ACPI: Using IOAPIC for interrupt routing >Oct 28 20:39:39 unused kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug >Oct 28 20:39:39 unused kernel: ACPI: No dock devices found. >Oct 28 20:39:39 unused kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) >Oct 28 20:39:39 unused kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI] >Oct 28 20:39:39 unused kernel: acpi PNP0A03:00: _OSC failed (AE_NOT_FOUND); disabling ASPM >Oct 28 20:39:39 unused kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. >Oct 28 20:39:39 unused kernel: acpiphp: Slot [4] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [5] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [6] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [7] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [8] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [9] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [10] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [11] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [12] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [13] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [14] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [15] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [16] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [17] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [18] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [19] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [20] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [21] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [22] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [23] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [24] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [25] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [26] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [27] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [28] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [29] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [30] registered >Oct 28 20:39:39 unused kernel: acpiphp: Slot [31] registered >Oct 28 20:39:39 unused kernel: PCI host bridge to bus 0000:00 >Oct 28 20:39:39 unused kernel: pci_bus 0000:00: root bus resource [bus 00-ff] >Oct 28 20:39:39 unused kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7] >Oct 28 20:39:39 unused kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xadff] >Oct 28 20:39:39 unused kernel: pci_bus 0000:00: root bus resource [io 0xae0f-0xaeff] >Oct 28 20:39:39 unused kernel: pci_bus 0000:00: root bus resource [io 0xaf20-0xafdf] >Oct 28 20:39:39 unused kernel: pci_bus 0000:00: root bus resource [io 0xafe4-0xffff] >Oct 28 20:39:39 unused kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff] >Oct 28 20:39:39 unused kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff] >Oct 28 20:39:39 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] >Oct 28 20:39:39 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] >Oct 28 20:39:39 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] >Oct 28 20:39:39 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] >Oct 28 20:39:39 unused kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI >Oct 28 20:39:39 unused kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB >Oct 28 20:39:39 unused kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) >Oct 28 20:39:39 unused kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) >Oct 28 20:39:39 unused kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) >Oct 28 20:39:39 unused kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) >Oct 28 20:39:39 unused kernel: ACPI: PCI Interrupt Link [LNKS] (IRQs *9) >Oct 28 20:39:39 unused kernel: ACPI: Enabled 16 GPEs in block 00 to 0F >Oct 28 20:39:39 unused kernel: vgaarb: device added: PCI:0000:00:02.0,decodes=io+mem,owns=io+mem,locks=none >Oct 28 20:39:39 unused kernel: vgaarb: loaded >Oct 28 20:39:39 unused kernel: vgaarb: bridge control possible 0000:00:02.0 >Oct 28 20:39:39 unused kernel: SCSI subsystem initialized >Oct 28 20:39:39 unused kernel: ACPI: bus type USB registered >Oct 28 20:39:39 unused kernel: usbcore: registered new interface driver usbfs >Oct 28 20:39:39 unused kernel: usbcore: registered new interface driver hub >Oct 28 20:39:39 unused kernel: usbcore: registered new device driver usb >Oct 28 20:39:39 unused kernel: PCI: Using ACPI for IRQ routing >Oct 28 20:39:39 unused kernel: NetLabel: Initializing >Oct 28 20:39:39 unused kernel: NetLabel: domain hash size = 128 >Oct 28 20:39:39 unused kernel: NetLabel: protocols = UNLABELED CIPSOv4 >Oct 28 20:39:39 unused kernel: NetLabel: unlabeled traffic allowed by default >Oct 28 20:39:39 unused kernel: Switching to clocksource kvm-clock >Oct 28 20:39:39 unused kernel: pnp: PnP ACPI init >Oct 28 20:39:39 unused kernel: ACPI: bus type PNP registered >Oct 28 20:39:39 unused kernel: pnp: PnP ACPI: found 6 devices >Oct 28 20:39:39 unused kernel: ACPI: bus type PNP unregistered >Oct 28 20:39:39 unused kernel: NET: Registered protocol family 2 >Oct 28 20:39:39 unused kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes) >Oct 28 20:39:39 unused kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes) >Oct 28 20:39:39 unused kernel: TCP: Hash tables configured (established 32768 bind 32768) >Oct 28 20:39:39 unused kernel: TCP: reno registered >Oct 28 20:39:39 unused kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes) >Oct 28 20:39:39 unused kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes) >Oct 28 20:39:39 unused kernel: NET: Registered protocol family 1 >Oct 28 20:39:39 unused kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers >Oct 28 20:39:39 unused kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release >Oct 28 20:39:39 unused kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds >Oct 28 20:39:39 unused kernel: ACPI: PCI Interrupt Link [LNKC] enabled at IRQ 11 >Oct 28 20:39:39 unused kernel: Unpacking initramfs... >Oct 28 20:39:39 unused kernel: Freeing initrd memory: 18292k freed >Oct 28 20:39:39 unused kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) >Oct 28 20:39:39 unused kernel: software IO TLB [mem 0xbbfe0000-0xbffe0000] (64MB) mapped at [ffff8800bbfe0000-ffff8800bffdffff] >Oct 28 20:39:39 unused kernel: RAPL PMU detected, hw unit 2^-0 Joules, API unit is 2^-32 Joules, 3 fixed counters 10737418240 ms ovfl timer >Oct 28 20:39:39 unused kernel: microcode: CPU0 sig=0x206a1, pf=0x1, revision=0x1 >Oct 28 20:39:39 unused kernel: microcode: CPU1 sig=0x206a1, pf=0x1, revision=0x1 >Oct 28 20:39:39 unused kernel: microcode: CPU2 sig=0x206a1, pf=0x1, revision=0x1 >Oct 28 20:39:39 unused kernel: microcode: CPU3 sig=0x206a1, pf=0x1, revision=0x1 >Oct 28 20:39:39 unused kernel: microcode: Microcode Update Driver: v2.00 <tigran@aivazian.fsnet.co.uk>, Peter Oruba >Oct 28 20:39:39 unused kernel: futex hash table entries: 1024 (order: 4, 65536 bytes) >Oct 28 20:39:39 unused kernel: Initialise system trusted keyring >Oct 28 20:39:39 unused kernel: audit: initializing netlink socket (disabled) >Oct 28 20:39:39 unused kernel: type=2000 audit(1414499979.421:1): initialized >Oct 28 20:39:39 unused kernel: HugeTLB registered 2 MB page size, pre-allocated 0 pages >Oct 28 20:39:39 unused kernel: zbud: loaded >Oct 28 20:39:39 unused kernel: VFS: Disk quotas dquot_6.5.2 >Oct 28 20:39:39 unused kernel: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) >Oct 28 20:39:39 unused kernel: msgmni has been set to 7580 >Oct 28 20:39:39 unused kernel: Key type big_key registered >Oct 28 20:39:39 unused kernel: alg: No test for stdrng (krng) >Oct 28 20:39:39 unused kernel: NET: Registered protocol family 38 >Oct 28 20:39:39 unused kernel: Key type asymmetric registered >Oct 28 20:39:39 unused kernel: Asymmetric key parser 'x509' registered >Oct 28 20:39:39 unused kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 252) >Oct 28 20:39:39 unused kernel: io scheduler noop registered >Oct 28 20:39:39 unused kernel: io scheduler deadline registered (default) >Oct 28 20:39:39 unused kernel: io scheduler cfq registered >Oct 28 20:39:39 unused kernel: pci_hotplug: PCI Hot Plug PCI Core version: 0.5 >Oct 28 20:39:39 unused kernel: pciehp: PCI Express Hot Plug Controller Driver version: 0.4 >Oct 28 20:39:39 unused kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 >Oct 28 20:39:39 unused kernel: ACPI: Power Button [PWRF] >Oct 28 20:39:39 unused kernel: GHES: HEST is not enabled! >Oct 28 20:39:39 unused kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled >Oct 28 20:39:39 unused kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A >Oct 28 20:39:39 unused kernel: Non-volatile memory driver v1.3 >Oct 28 20:39:39 unused kernel: Linux agpgart interface v0.103 >Oct 28 20:39:39 unused kernel: crash memory driver: version 1.1 >Oct 28 20:39:39 unused kernel: rdac: device handler registered >Oct 28 20:39:39 unused kernel: hp_sw: device handler registered >Oct 28 20:39:39 unused kernel: emc: device handler registered >Oct 28 20:39:39 unused kernel: alua: device handler registered >Oct 28 20:39:39 unused kernel: libphy: Fixed MDIO Bus: probed >Oct 28 20:39:39 unused kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver >Oct 28 20:39:39 unused kernel: ehci-pci: EHCI PCI platform driver >Oct 28 20:39:39 unused kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver >Oct 28 20:39:39 unused kernel: ohci-pci: OHCI PCI platform driver >Oct 28 20:39:39 unused kernel: uhci_hcd: USB Universal Host Controller Interface driver >Oct 28 20:39:39 unused kernel: uhci_hcd 0000:00:03.0: UHCI Host Controller >Oct 28 20:39:39 unused kernel: uhci_hcd 0000:00:03.0: new USB bus registered, assigned bus number 1 >Oct 28 20:39:39 unused kernel: uhci_hcd 0000:00:03.0: detected 2 ports >Oct 28 20:39:39 unused kernel: uhci_hcd 0000:00:03.0: irq 11, io base 0x0000c0a0 >Oct 28 20:39:39 unused kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001 >Oct 28 20:39:39 unused kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Oct 28 20:39:39 unused kernel: usb usb1: Product: UHCI Host Controller >Oct 28 20:39:39 unused kernel: usb usb1: Manufacturer: Linux 3.10.0-175.el7.x86_64 uhci_hcd >Oct 28 20:39:39 unused kernel: usb usb1: SerialNumber: 0000:00:03.0 >Oct 28 20:39:39 unused kernel: hub 1-0:1.0: USB hub found >Oct 28 20:39:39 unused kernel: hub 1-0:1.0: 2 ports detected >Oct 28 20:39:39 unused kernel: usbcore: registered new interface driver usbserial >Oct 28 20:39:39 unused kernel: usbcore: registered new interface driver usbserial_generic >Oct 28 20:39:39 unused kernel: usbserial: USB Serial support registered for generic >Oct 28 20:39:39 unused kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 >Oct 28 20:39:39 unused kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 >Oct 28 20:39:39 unused kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 >Oct 28 20:39:39 unused kernel: mousedev: PS/2 mouse device common for all mice >Oct 28 20:39:39 unused kernel: rtc_cmos 00:00: RTC can wake from S4 >Oct 28 20:39:39 unused kernel: rtc_cmos 00:00: rtc core: registered rtc_cmos as rtc0 >Oct 28 20:39:39 unused kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram >Oct 28 20:39:39 unused kernel: cpuidle: using governor menu >Oct 28 20:39:39 unused kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 >Oct 28 20:39:39 unused kernel: hidraw: raw HID events driver (C) Jiri Kosina >Oct 28 20:39:39 unused kernel: usbcore: registered new interface driver usbhid >Oct 28 20:39:39 unused kernel: usbhid: USB HID core driver >Oct 28 20:39:39 unused kernel: drop_monitor: Initializing network drop monitor service >Oct 28 20:39:39 unused kernel: TCP: cubic registered >Oct 28 20:39:39 unused kernel: Initializing XFRM netlink socket >Oct 28 20:39:39 unused kernel: NET: Registered protocol family 10 >Oct 28 20:39:39 unused kernel: NET: Registered protocol family 17 >Oct 28 20:39:39 unused kernel: Loading compiled-in X.509 certificates >Oct 28 20:39:39 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' >Oct 28 20:39:39 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' >Oct 28 20:39:39 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: 4304258329ea0da1b80ad429df72c33fe68bdcec' >Oct 28 20:39:39 unused kernel: registered taskstats version 1 >Oct 28 20:39:39 unused kernel: Key type trusted registered >Oct 28 20:39:39 unused kernel: Key type encrypted registered >Oct 28 20:39:39 unused kernel: IMA: No TPM chip found, activating TPM-bypass! >Oct 28 20:39:39 unused kernel: rtc_cmos 00:00: setting system clock to 2014-10-28 12:39:39 UTC (1414499979) >Oct 28 20:39:39 unused kernel: Freeing unused kernel memory: 1604k freed >Oct 28 20:39:39 unused systemd[1]: systemd 208 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ) >Oct 28 20:39:39 unused systemd[1]: Detected virtualization 'kvm'. >Oct 28 20:39:39 unused systemd[1]: Running in initial RAM disk. >Oct 28 20:39:39 unused systemd[1]: Set hostname to <unused>. >Oct 28 20:39:39 unused systemd[1]: Expecting device dev-mapper-rhel_unused\x2droot.device... >Oct 28 20:39:39 unused systemd[1]: Starting -.slice. >Oct 28 20:39:39 unused systemd[1]: Created slice -.slice. >Oct 28 20:39:39 unused systemd[1]: Starting System Slice. >Oct 28 20:39:39 unused systemd[1]: Created slice System Slice. >Oct 28 20:39:39 unused systemd[1]: Starting Slices. >Oct 28 20:39:39 unused systemd[1]: Reached target Slices. >Oct 28 20:39:39 unused systemd[1]: Starting Timers. >Oct 28 20:39:39 unused systemd[1]: Reached target Timers. >Oct 28 20:39:39 unused systemd[1]: Starting Journal Socket. >Oct 28 20:39:39 unused systemd[1]: Listening on Journal Socket. >Oct 28 20:39:39 unused systemd[1]: Started dracut ask for additional cmdline parameters. >Oct 28 20:39:39 unused systemd[1]: Starting dracut cmdline hook... >Oct 28 20:39:39 unused systemd[1]: Started Load Kernel Modules. >Oct 28 20:39:39 unused systemd[1]: Starting Setup Virtual Console... >Oct 28 20:39:39 unused systemd[1]: Starting Journal Service... >Oct 28 20:39:39 unused systemd[1]: Started Journal Service. >Oct 28 20:39:39 unused journal: Journal started >Oct 28 20:39:39 unused systemd: Starting udev Kernel Socket. >Oct 28 20:39:39 unused systemd: Listening on udev Kernel Socket. >Oct 28 20:39:39 unused systemd: Starting udev Control Socket. >Oct 28 20:39:39 unused systemd: Listening on udev Control Socket. >Oct 28 20:39:39 unused systemd: Starting Sockets. >Oct 28 20:39:39 unused systemd: Reached target Sockets. >Oct 28 20:39:39 unused systemd: Starting Create list of required static device nodes for the current kernel... >Oct 28 20:39:39 unused dracut-cmdline: dracut-7.1 (Maipo) dracut-033-224.el7 >Oct 28 20:39:39 unused dracut-cmdline: Using kernel command line parameters: >Oct 28 20:39:39 unused systemd: Starting Apply Kernel Variables... >Oct 28 20:39:39 unused systemd: Starting Swap. >Oct 28 20:39:39 unused systemd: Reached target Swap. >Oct 28 20:39:39 unused systemd: Starting Local File Systems. >Oct 28 20:39:39 unused systemd: Reached target Local File Systems. >Oct 28 20:39:39 unused systemd: Started Apply Kernel Variables. >Oct 28 20:39:39 unused systemd: Started Create list of required static device nodes for the current kernel. >Oct 28 20:39:39 unused systemd: Starting Create static device nodes in /dev... >Oct 28 20:39:39 unused systemd: Started Create static device nodes in /dev. >Oct 28 20:39:39 unused systemd: Started Setup Virtual Console. >Oct 28 20:39:39 unused systemd: Started dracut cmdline hook. >Oct 28 20:39:39 unused systemd: Starting dracut pre-udev hook... >Oct 28 20:39:39 unused kernel: device-mapper: uevent: version 1.0.3 >Oct 28 20:39:39 unused kernel: device-mapper: ioctl: 4.27.0-ioctl (2013-10-30) initialised: dm-devel@redhat.com >Oct 28 20:39:39 unused systemd: Started dracut pre-udev hook. >Oct 28 20:39:39 unused systemd: Starting udev Kernel Device Manager... >Oct 28 20:39:39 unused systemd-udevd[256]: starting version 208 >Oct 28 20:39:39 unused systemd: Started udev Kernel Device Manager. >Oct 28 20:39:39 unused systemd: Started dracut pre-trigger hook. >Oct 28 20:39:39 unused systemd: Starting udev Coldplug all Devices... >Oct 28 20:39:39 unused kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd >Oct 28 20:39:39 unused systemd: Mounting Configuration File System... >Oct 28 20:39:39 unused systemd: Mounted Configuration File System. >Oct 28 20:39:39 unused systemd: Started udev Coldplug all Devices. >Oct 28 20:39:39 unused systemd: Starting dracut initqueue hook... >Oct 28 20:39:39 unused systemd: Starting System Initialization. >Oct 28 20:39:39 unused kernel: ACPI: bus type ATA registered >Oct 28 20:39:39 unused systemd: Reached target System Initialization. >Oct 28 20:39:39 unused systemd: Starting Show Plymouth Boot Screen... >Oct 28 20:39:39 unused kernel: e1000: Intel(R) PRO/1000 Network Driver - version 7.3.21-k8-NAPI >Oct 28 20:39:39 unused kernel: e1000: Copyright (c) 1999-2006 Intel Corporation. >Oct 28 20:39:39 unused kernel: FDC 0 is a S82078B >Oct 28 20:39:39 unused kernel: [drm] Initialized drm 1.1.0 20060810 >Oct 28 20:39:39 unused systemd: Started Show Plymouth Boot Screen. >Oct 28 20:39:39 unused systemd: Started Dispatch Password Requests to Console Directory Watch. >Oct 28 20:39:39 unused systemd: Starting Paths. >Oct 28 20:39:39 unused systemd: Reached target Paths. >Oct 28 20:39:39 unused systemd: Starting Forward Password Requests to Plymouth Directory Watch. >Oct 28 20:39:39 unused systemd: Started Forward Password Requests to Plymouth Directory Watch. >Oct 28 20:39:39 unused systemd: Starting Basic System. >Oct 28 20:39:39 unused systemd: Reached target Basic System. >Oct 28 20:39:39 unused kernel: ACPI: PCI Interrupt Link [LNKD] enabled at IRQ 10 >Oct 28 20:39:39 unused kernel: scsi host0: ata_piix >Oct 28 20:39:39 unused kernel: scsi host1: ata_piix >Oct 28 20:39:39 unused kernel: scsi host2: Virtio SCSI HBA >Oct 28 20:39:39 unused kernel: scsi 2:0:0:0: Direct-Access QEMU QEMU HARDDISK 2.1. PQ: 0 ANSI: 5 >Oct 28 20:39:39 unused kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 >Oct 28 20:39:39 unused kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 >Oct 28 20:39:39 unused kernel: ACPI: PCI Interrupt Link [LNKA] enabled at IRQ 10 >Oct 28 20:39:39 unused kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001 >Oct 28 20:39:39 unused kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=5 >Oct 28 20:39:39 unused kernel: usb 1-1: Product: QEMU USB Tablet >Oct 28 20:39:39 unused kernel: usb 1-1: Manufacturer: QEMU >Oct 28 20:39:39 unused kernel: usb 1-1: SerialNumber: 42 >Oct 28 20:39:39 unused kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:03.0/usb1/1-1/1-1:1.0/input/input2 >Oct 28 20:39:39 unused kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Pointer [QEMU QEMU USB Tablet] on usb-0000:00:03.0-1/input0 >Oct 28 20:39:40 unused kernel: sd 2:0:0:0: [sda] 41943040 512-byte logical blocks: (21.4 GB/20.0 GiB) >Oct 28 20:39:40 unused kernel: sd 2:0:0:0: [sda] Write Protect is off >Oct 28 20:39:40 unused kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA >Oct 28 20:39:40 unused kernel: sda: sda1 sda2 >Oct 28 20:39:40 unused kernel: sd 2:0:0:0: [sda] Attached SCSI disk >Oct 28 20:39:40 unused kernel: e1000 0000:00:05.0 eth0: (PCI:33MHz:32-bit) 9a:d4:d5:d6:d7:d8 >Oct 28 20:39:40 unused kernel: e1000 0000:00:05.0 eth0: Intel(R) PRO/1000 Network Connection >Oct 28 20:39:40 unused kernel: ACPI: PCI Interrupt Link [LNKB] enabled at IRQ 11 >Oct 28 20:39:40 unused kernel: [drm] Device Version 0.0 >Oct 28 20:39:40 unused kernel: [drm] Compression level 0 log level 0 >Oct 28 20:39:40 unused kernel: [drm] Currently using mode #0, list at 0x488 >Oct 28 20:39:40 unused kernel: [drm] 12286 io pages at offset 0x1000000 >Oct 28 20:39:40 unused kernel: [drm] 16777216 byte draw area at offset 0x0 >Oct 28 20:39:40 unused kernel: [drm] RAM header offset: 0x3ffe000 >Oct 28 20:39:40 unused kernel: [drm] rom modes offset 0x488 for 128 modes >Oct 28 20:39:40 unused kernel: [TTM] Zone kernel: Available graphics memory: 1941482 kiB >Oct 28 20:39:40 unused kernel: [TTM] Initializing pool allocator >Oct 28 20:39:40 unused kernel: [TTM] Initializing DMA pool allocator >Oct 28 20:39:40 unused kernel: [drm] qxl: 16M of VRAM memory size >Oct 28 20:39:40 unused systemd-udevd[259]: renamed network interface eth0 to ens5 >Oct 28 20:39:40 unused kernel: [drm] qxl: 63M of IO pages memory ready (VRAM domain) >Oct 28 20:39:40 unused kernel: [drm] qxl: 32M of Surface memory size >Oct 28 20:39:40 unused kernel: tsc: Refined TSC clocksource calibration: 2000.008 MHz >Oct 28 20:39:40 unused kernel: [drm] main mem slot 1 [f8000000,3ffe000] >Oct 28 20:39:40 unused kernel: [drm] surface mem slot 2 [fc000000,2000000] >Oct 28 20:39:40 unused kernel: [drm] fb mappable at 0xF8000000, size 3145728 >Oct 28 20:39:40 unused kernel: [drm] fb: depth 24, pitch 4096, width 1024, height 768 >Oct 28 20:39:40 unused kernel: fbcon: qxldrmfb (fb0) is primary device >Oct 28 20:39:40 unused kernel: Console: switching to colour frame buffer device 128x48 >Oct 28 20:39:40 unused kernel: qxl 0000:00:02.0: fb0: qxldrmfb frame buffer device >Oct 28 20:39:40 unused kernel: qxl 0000:00:02.0: registered panic notifier >Oct 28 20:39:40 unused kernel: [drm] Initialized qxl 0.1.0 20120117 for 0000:00:02.0 on minor 0 >Oct 28 20:39:40 unused dracut-initqueue: Scanning devices sda2 for LVM logical volumes rhel_unused/root rhel_unused/swap >Oct 28 20:39:40 unused dracut-initqueue: inactive '/dev/rhel_unused/swap' [2.00 GiB] inherit >Oct 28 20:39:40 unused dracut-initqueue: inactive '/dev/rhel_unused/root' [17.47 GiB] inherit >Oct 28 20:39:40 unused kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 >Oct 28 20:39:40 unused systemd: Found device /dev/mapper/rhel_unused-root. >Oct 28 20:39:40 unused systemd: Starting File System Check on /dev/mapper/rhel_unused-root... >Oct 28 20:39:40 unused systemd-fsck: /sbin/fsck.xfs: XFS file system. >Oct 28 20:39:40 unused systemd: Started File System Check on /dev/mapper/rhel_unused-root. >Oct 28 20:39:40 unused systemd: Started dracut initqueue hook. >Oct 28 20:39:40 unused systemd: Started dracut pre-mount hook. >Oct 28 20:39:40 unused systemd: Mounting /sysroot... >Oct 28 20:39:40 unused systemd: Starting Remote File Systems (Pre). >Oct 28 20:39:40 unused systemd: Reached target Remote File Systems (Pre). >Oct 28 20:39:40 unused systemd: Starting Remote File Systems. >Oct 28 20:39:40 unused systemd: Reached target Remote File Systems. >Oct 28 20:39:40 unused kernel: SGI XFS with ACLs, security attributes, large block/inode numbers, no debug enabled >Oct 28 20:39:40 unused kernel: XFS (dm-0): Mounting Filesystem >Oct 28 20:39:40 unused kernel: XFS (dm-0): Ending clean mount >Oct 28 20:39:40 unused systemd: Mounted /sysroot. >Oct 28 20:39:40 unused systemd: Starting Initrd Root File System. >Oct 28 20:39:40 unused systemd: Reached target Initrd Root File System. >Oct 28 20:39:40 unused systemd: Starting Reload Configuration from the Real Root... >Oct 28 20:39:40 unused systemd: Reloading. >Oct 28 20:39:40 unused systemd: Started Reload Configuration from the Real Root. >Oct 28 20:39:40 unused systemd: Starting Initrd File Systems. >Oct 28 20:39:40 unused systemd: Reached target Initrd File Systems. >Oct 28 20:39:40 unused systemd: Started dracut mount hook. >Oct 28 20:39:40 unused systemd: Starting Initrd Default Target. >Oct 28 20:39:40 unused systemd: Reached target Initrd Default Target. >Oct 28 20:39:40 unused systemd: Starting dracut pre-pivot and cleanup hook... >Oct 28 20:39:41 unused systemd: Started dracut pre-pivot and cleanup hook. >Oct 28 20:39:41 unused systemd: Starting Cleaning Up and Shutting Down Daemons... >Oct 28 20:39:41 unused systemd: Stopping Cleaning Up and Shutting Down Daemons... >Oct 28 20:39:41 unused systemd: Starting Plymouth switch root service... >Oct 28 20:39:41 unused systemd: Stopped Cleaning Up and Shutting Down Daemons. >Oct 28 20:39:41 unused systemd: Stopping dracut pre-pivot and cleanup hook... >Oct 28 20:39:41 unused systemd: Stopped dracut pre-pivot and cleanup hook. >Oct 28 20:39:41 unused systemd: Stopping Remote File Systems. >Oct 28 20:39:41 unused systemd: Stopped target Remote File Systems. >Oct 28 20:39:41 unused systemd: Stopping Remote File Systems (Pre). >Oct 28 20:39:41 unused systemd: Stopped target Remote File Systems (Pre). >Oct 28 20:39:41 unused systemd: Stopping dracut initqueue hook... >Oct 28 20:39:41 unused systemd: Stopped dracut initqueue hook. >Oct 28 20:39:41 unused systemd: Stopping Initrd Default Target. >Oct 28 20:39:41 unused systemd: Stopped target Initrd Default Target. >Oct 28 20:39:41 unused systemd: Stopping Basic System. >Oct 28 20:39:41 unused systemd: Stopped target Basic System. >Oct 28 20:39:41 unused systemd: Stopping Slices. >Oct 28 20:39:41 unused systemd: Stopped target Slices. >Oct 28 20:39:41 unused systemd: Stopping Paths. >Oct 28 20:39:41 unused systemd: Stopped target Paths. >Oct 28 20:39:41 unused systemd: Stopping Timers. >Oct 28 20:39:41 unused systemd: Stopped target Timers. >Oct 28 20:39:41 unused systemd: Stopping Sockets. >Oct 28 20:39:41 unused systemd: Stopped target Sockets. >Oct 28 20:39:41 unused systemd: Stopping System Initialization. >Oct 28 20:39:41 unused systemd: Stopped target System Initialization. >Oct 28 20:39:41 unused systemd: Stopping Apply Kernel Variables... >Oct 28 20:39:41 unused systemd: Stopped Apply Kernel Variables. >Oct 28 20:39:41 unused systemd: Stopping udev Coldplug all Devices... >Oct 28 20:39:41 unused systemd: Stopped udev Coldplug all Devices. >Oct 28 20:39:41 unused systemd: Stopping Swap. >Oct 28 20:39:41 unused systemd: Stopped target Swap. >Oct 28 20:39:41 unused systemd: Stopping Local File Systems. >Oct 28 20:39:41 unused systemd: Stopped target Local File Systems. >Oct 28 20:39:41 unused systemd: Stopping udev Kernel Device Manager... >Oct 28 20:39:41 unused systemd: Stopped udev Kernel Device Manager. >Oct 28 20:39:41 unused systemd: Stopping dracut pre-udev hook... >Oct 28 20:39:41 unused systemd: Stopped dracut pre-udev hook. >Oct 28 20:39:41 unused systemd: Stopping dracut cmdline hook... >Oct 28 20:39:41 unused systemd: Stopped dracut cmdline hook. >Oct 28 20:39:41 unused systemd: Stopping Create static device nodes in /dev... >Oct 28 20:39:41 unused systemd: Stopped Create static device nodes in /dev. >Oct 28 20:39:41 unused systemd: Stopping Create list of required static device nodes for the current kernel... >Oct 28 20:39:41 unused systemd: Stopped Create list of required static device nodes for the current kernel. >Oct 28 20:39:41 unused systemd: Stopping udev Kernel Socket. >Oct 28 20:39:41 unused systemd: Closed udev Kernel Socket. >Oct 28 20:39:41 unused systemd: Stopping udev Control Socket. >Oct 28 20:39:41 unused systemd: Closed udev Control Socket. >Oct 28 20:39:41 unused systemd: Starting Cleanup udevd DB... >Oct 28 20:39:41 unused systemd: Started Cleanup udevd DB. >Oct 28 20:39:41 unused systemd: Starting Switch Root. >Oct 28 20:39:41 unused systemd: Reached target Switch Root. >Oct 28 20:39:41 unused systemd: Started Plymouth switch root service. >Oct 28 20:39:41 unused systemd: Starting Switch Root... >Oct 28 20:39:41 unused systemd: Switching root. >Oct 28 20:39:41 unused journal: Journal stopped >Oct 28 20:39:46 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 28 20:39:46 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 28 20:39:46 unused systemd-journald[108]: Received SIGTERM >Oct 28 20:39:46 unused systemd-cgroups-agent[458]: Failed to get D-Bus connection: Unknown error -1 >Oct 28 20:39:46 unused kernel: type=1404 audit(1414499981.612:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 >Oct 28 20:39:46 unused kernel: type=1403 audit(1414499981.852:3): policy loaded auid=4294967295 ses=4294967295 >Oct 28 20:39:46 unused systemd[1]: Successfully loaded SELinux policy in 277.154ms. >Oct 28 20:39:46 unused systemd[1]: Relabelled /dev and /run in 21.074ms. >Oct 28 20:39:46 unused journal: Journal started >Oct 28 20:39:46 unused systemd: systemd 208 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ) >Oct 28 20:39:46 unused systemd: Detected virtualization 'kvm'. >Oct 28 20:39:46 unused systemd: Set hostname to <unused>. >Oct 28 20:39:46 unused systemd: /usr/lib/systemd/system-generators/anaconda-generator exited with exit status 1. >Oct 28 20:39:46 unused systemd: [/usr/lib/systemd/system/lvm2-lvmetad.socket:9] Unknown lvalue 'RemoveOnStop' in section 'Socket' >Oct 28 20:39:46 unused systemd: [/usr/lib/systemd/system/dm-event.socket:10] Unknown lvalue 'RemoveOnStop' in section 'Socket' >Oct 28 20:39:46 unused systemd: Started Load/Save Random Seed. >Oct 28 20:39:46 unused systemd: Starting LVM2 metadata daemon... >Oct 28 20:39:46 unused systemd: Started LVM2 metadata daemon. >Oct 28 20:39:46 unused systemd: Started Create static device nodes in /dev. >Oct 28 20:39:46 unused systemd: Started Import network configuration from initramfs. >Oct 28 20:39:47 unused systemd: Started Configure read-only root support. >Oct 28 20:39:47 unused systemd: Starting udev Kernel Device Manager... >Oct 28 20:39:47 unused systemd: Starting Local File Systems (Pre). >Oct 28 20:39:47 unused lvm: 2 logical volume(s) in volume group "rhel_unused" monitored >Oct 28 20:39:47 unused systemd: Reached target Local File Systems (Pre). >Oct 28 20:39:47 unused systemd-udevd[526]: starting version 208 >Oct 28 20:39:47 unused systemd: Started udev Kernel Device Manager. >Oct 28 20:39:47 unused systemd: Started Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. >Oct 28 20:39:48 unused systemd: Started udev Wait for Complete Device Initialization. >Oct 28 20:39:48 unused systemd: Starting Activation of DM RAID sets... >Oct 28 20:39:48 unused systemd: Found device /dev/ttyS0. >Oct 28 20:39:49 unused kernel: input: PC Speaker as /devices/platform/pcspkr/input/input4 >Oct 28 20:39:49 unused kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 >Oct 28 20:39:49 unused kernel: ppdev: user-space parallel port driver >Oct 28 20:39:49 unused kernel: alg: No test for __gcm-aes-aesni (__driver-gcm-aes-aesni) >Oct 28 20:39:49 unused mtp-probe: checking bus 1, device 2: "/sys/devices/pci0000:00/0000:00:03.0/usb1/1-1" >Oct 28 20:39:49 unused mtp-probe: bus: 1, device: 2 was not an MTP device >Oct 28 20:39:50 unused systemd: Started Activation of DM RAID sets. >Oct 28 20:39:50 unused systemd: Starting Encrypted Volumes. >Oct 28 20:39:50 unused systemd: Reached target Encrypted Volumes. >Oct 28 20:39:50 unused systemd: Starting LVM2 PV scan on device 8:2... >Oct 28 20:39:50 unused kernel: alg: No test for crc32 (crc32-pclmul) >Oct 28 20:39:50 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 28 20:39:50 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 28 20:39:50 unused systemd: Found device /dev/mapper/rhel_unused-swap. >Oct 28 20:39:50 unused systemd: Activating swap /dev/mapper/rhel_unused-swap... >Oct 28 20:39:50 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 28 20:39:50 unused lvm: 2 logical volume(s) in volume group "rhel_unused" now active >Oct 28 20:39:50 unused systemd: Found device QEMU_HARDDISK. >Oct 28 20:39:50 unused systemd: Mounting /boot... >Oct 28 20:39:50 unused kernel: Adding 2097148k swap on /dev/mapper/rhel_unused-swap. Priority:-1 extents:1 across:2097148k FS >Oct 28 20:39:50 unused systemd: Started LVM2 PV scan on device 8:2. >Oct 28 20:39:51 unused systemd: Activated swap /dev/mapper/rhel_unused-swap. >Oct 28 20:39:51 unused kernel: XFS (sda1): Mounting Filesystem >Oct 28 20:39:51 unused systemd: Starting Swap. >Oct 28 20:39:51 unused systemd: Reached target Swap. >Oct 28 20:40:04 unused kernel: XFS (sda1): Ending clean mount >Oct 28 20:40:04 unused systemd: Mounted /boot. >Oct 28 20:40:04 unused systemd: Starting Local File Systems. >Oct 28 20:40:04 unused systemd: Reached target Local File Systems. >Oct 28 20:40:04 unused systemd: Started Mark the need to relabel after reboot. >Oct 28 20:40:04 unused systemd: Started Relabel all filesystems, if necessary. >Oct 28 20:40:04 unused systemd: Started Reconfigure the system on administrator request. >Oct 28 20:40:04 unused systemd: Starting Create Volatile Files and Directories... >Oct 28 20:40:04 unused systemd: Starting Tell Plymouth To Write Out Runtime Data... >Oct 28 20:40:04 unused systemd: Started Create Volatile Files and Directories. >Oct 28 20:40:04 unused systemd: Starting Security Auditing Service... >Oct 28 20:40:04 unused systemd: Started Tell Plymouth To Write Out Runtime Data. >Oct 28 20:40:05 unused auditd[611]: Started dispatcher: /sbin/audispd pid: 623 >Oct 28 20:40:05 unused kernel: type=1305 audit(1414500005.072:4): audit_pid=611 old=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 >Oct 28 20:40:05 unused auditd[611]: Init complete, auditd 2.4 listening for events (startup state enable) >Oct 28 20:40:05 unused audispd: audispd initialized with q_depth=150 and 1 active plugins >Oct 28 20:40:05 unused augenrules: No rules >Oct 28 20:40:05 unused augenrules: enabled 1 >Oct 28 20:40:05 unused augenrules: flag 1 >Oct 28 20:40:05 unused augenrules: pid 611 >Oct 28 20:40:05 unused augenrules: rate_limit 0 >Oct 28 20:40:05 unused augenrules: backlog_limit 320 >Oct 28 20:40:05 unused augenrules: lost 0 >Oct 28 20:40:05 unused augenrules: backlog 1 >Oct 28 20:40:05 unused systemd: Started Security Auditing Service. >Oct 28 20:40:05 unused systemd: Starting Update UTMP about System Reboot/Shutdown... >Oct 28 20:40:05 unused systemd: Started Update UTMP about System Reboot/Shutdown. >Oct 28 20:40:05 unused systemd: Starting System Initialization. >Oct 28 20:40:05 unused systemd: Reached target System Initialization. >Oct 28 20:40:05 unused systemd: Starting Daily Cleanup of Temporary Directories. >Oct 28 20:40:05 unused systemd: Started Daily Cleanup of Temporary Directories. >Oct 28 20:40:05 unused systemd: Starting Timers. >Oct 28 20:40:05 unused systemd: Reached target Timers. >Oct 28 20:40:05 unused systemd: Starting Open-iSCSI iscsid Socket. >Oct 28 20:40:05 unused systemd: Listening on Open-iSCSI iscsid Socket. >Oct 28 20:40:05 unused systemd: Starting Open-iSCSI iscsiuio Socket. >Oct 28 20:40:05 unused systemd: Listening on Open-iSCSI iscsiuio Socket. >Oct 28 20:40:05 unused systemd: Starting RPCbind Server Activation Socket. >Oct 28 20:40:05 unused systemd: Listening on RPCbind Server Activation Socket. >Oct 28 20:40:05 unused systemd: Starting Avahi mDNS/DNS-SD Stack Activation Socket. >Oct 28 20:40:05 unused systemd: Listening on Avahi mDNS/DNS-SD Stack Activation Socket. >Oct 28 20:40:05 unused systemd: Starting Flexible branding. >Oct 28 20:40:05 unused systemd: Started Flexible branding. >Oct 28 20:40:05 unused systemd: Starting Paths. >Oct 28 20:40:05 unused systemd: Reached target Paths. >Oct 28 20:40:05 unused systemd: Starting D-Bus System Message Bus Socket. >Oct 28 20:40:05 unused systemd: Listening on D-Bus System Message Bus Socket. >Oct 28 20:40:05 unused systemd: Starting Sockets. >Oct 28 20:40:05 unused systemd: Reached target Sockets. >Oct 28 20:40:05 unused systemd: Starting Basic System. >Oct 28 20:40:05 unused systemd: Reached target Basic System. >Oct 28 20:40:05 unused systemd: Starting firewalld - dynamic firewall daemon... >Oct 28 20:40:05 unused systemd: Started Load CPU microcode update. >Oct 28 20:40:05 unused systemd: Starting Dump dmesg to /var/log/dmesg... >Oct 28 20:40:05 unused systemd: Started Software RAID monitoring and management. >Oct 28 20:40:05 unused systemd: Starting libstoragemgmt plug-in server daemon... >Oct 28 20:40:06 unused systemd: Started libstoragemgmt plug-in server daemon. >Oct 28 20:40:06 unused systemd: Starting Avahi mDNS/DNS-SD Stack... >Oct 28 20:40:06 unused systemd: Starting NTP client/server... >Oct 28 20:40:06 unused systemd: Starting Kernel Samepage Merging... >Oct 28 20:40:06 unused systemd: Starting Rollback uncommitted netcf network config change transactions... >Oct 28 20:40:06 unused systemd: Starting System Logging Service... >Oct 28 20:40:06 unused netcf-transaction.sh: Running start: No pending transaction to rollback >Oct 28 20:40:06 unused systemd: Starting Resets System Activity Logs... >Oct 28 20:40:06 unused systemd: Starting Self Monitoring and Reporting Technology (SMART) Daemon... >Oct 28 20:40:06 unused systemd: Started Self Monitoring and Reporting Technology (SMART) Daemon. >Oct 28 20:40:06 unused systemd: Starting Dynamic System Tuning Daemon... >Oct 28 20:40:06 unused systemd: Starting Hardware RNG Entropy Gatherer Daemon... >Oct 28 20:40:06 unused systemd: Started Hardware RNG Entropy Gatherer Daemon. >Oct 28 20:40:06 unused systemd: Starting OpenSSH Server Key Generation... >Oct 28 20:40:06 unused avahi-daemon[643]: Found user 'avahi' (UID 70) and group 'avahi' (GID 70). >Oct 28 20:40:06 unused avahi-daemon[643]: Successfully dropped root privileges. >Oct 28 20:40:06 unused avahi-daemon[643]: avahi-daemon 0.6.31 starting up. >Oct 28 20:40:06 unused avahi-daemon[643]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns! >Oct 28 20:40:06 unused rngd: Unable to open file: /dev/tpm0 >Oct 28 20:40:06 unused rngd: can't open any entropy source >Oct 28 20:40:06 unused rngd: Maybe RNG device modules are not loaded >Oct 28 20:40:06 unused systemd: Starting irqbalance daemon... >Oct 28 20:40:06 unused systemd: Started irqbalance daemon. >Oct 28 20:40:06 unused systemd: Starting Login Service... >Oct 28 20:40:06 unused systemd: Starting Accounts Service... >Oct 28 20:40:06 unused systemd: Starting RealtimeKit Scheduling Policy Service... >Oct 28 20:40:06 unused systemd: Starting D-Bus System Message Bus... >Oct 28 20:40:07 unused systemd: Started D-Bus System Message Bus. >Oct 28 20:40:07 unused systemd: Started Dump dmesg to /var/log/dmesg. >Oct 28 20:40:07 unused systemd: Started Kernel Samepage Merging. >Oct 28 20:40:07 unused systemd: Started Rollback uncommitted netcf network config change transactions. >Oct 28 20:40:07 unused chronyd[671]: chronyd version 1.29.1 starting >Oct 28 20:40:07 unused smartd[651]: smartd 6.2 2013-07-26 r3841 [x86_64-linux-3.10.0-175.el7.x86_64] (local build) >Oct 28 20:40:07 unused smartd[651]: Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org >Oct 28 20:40:07 unused smartd[651]: Opened configuration file /etc/smartmontools/smartd.conf >Oct 28 20:40:07 unused systemd: Started Resets System Activity Logs. >Oct 28 20:40:07 unused systemd: rngd.service: main process exited, code=exited, status=1/FAILURE >Oct 28 20:40:07 unused systemd: Unit rngd.service entered failed state. >Oct 28 20:40:07 unused systemd: Starting Kernel Samepage Merging (KSM) Tuning Daemon... >Oct 28 20:40:07 unused smartd[651]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices >Oct 28 20:40:07 unused smartd[651]: Device: /dev/sda, opened >Oct 28 20:40:07 unused smartd[651]: Device: /dev/sda, [QEMU QEMU HARDDISK 2.1.], S/N: ["mWE!Ikrv#'$'N, 21.4 GB >Oct 28 20:40:07 unused chronyd[671]: Linux kernel major=3 minor=10 patch=0 >Oct 28 20:40:07 unused chronyd[671]: hz=100 shift_hz=7 freq_scale=1.00000000 nominal_tick=10000 slew_delta_tick=833 max_tick_bias=1000 shift_pll=2 >Oct 28 20:40:07 unused smartd[651]: Device: /dev/sda, Bad IEC (SMART) mode page, err=5, skip device >Oct 28 20:40:07 unused smartd[651]: Monitoring 0 ATA and 0 SCSI devices >Oct 28 20:40:07 unused chronyd[671]: Generated key 1 >Oct 28 20:40:08 unused systemd: Started Kernel Samepage Merging (KSM) Tuning Daemon. >Oct 28 20:40:08 unused systemd: Started System Logging Service. >Oct 28 20:40:08 unused systemd: Started NTP client/server. >Oct 28 20:40:09 unused sshd-keygen: Generating SSH2 RSA host key: [ OK ] >Oct 28 20:40:09 unused sshd-keygen: Generating SSH2 ECDSA host key: [ OK ] >Oct 28 20:40:09 unused sshd-keygen: Generating SSH2 ED25519 host key: [ OK ] >Oct 28 20:40:09 unused systemd: Started OpenSSH Server Key Generation. >Oct 28 20:40:09 unused dbus-daemon: dbus[668]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 28 20:40:09 unused dbus[668]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 28 20:40:09 unused systemd: Started Avahi mDNS/DNS-SD Stack. >Oct 28 20:40:09 unused avahi-daemon[643]: Successfully called chroot(). >Oct 28 20:40:09 unused avahi-daemon[643]: Successfully dropped remaining capabilities. >Oct 28 20:40:09 unused avahi-daemon[643]: No service file found in /etc/avahi/services. >Oct 28 20:40:09 unused systemd: Started RealtimeKit Scheduling Policy Service. >Oct 28 20:40:09 unused avahi-daemon[643]: Network interface enumeration completed. >Oct 28 20:40:09 unused avahi-daemon[643]: Registering HINFO record with values 'X86_64'/'LINUX'. >Oct 28 20:40:09 unused avahi-daemon[643]: Server startup complete. Host name is unused.local. Local service cookie is 2607298478. >Oct 28 20:40:09 unused systemd-logind: New seat seat0. >Oct 28 20:40:09 unused systemd-logind: Watching system buttons on /dev/input/event0 (Power Button) >Oct 28 20:40:09 unused systemd: Started Login Service. >Oct 28 20:40:10 unused dbus-daemon: dbus[668]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Oct 28 20:40:10 unused dbus[668]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Oct 28 20:40:10 unused systemd: Starting Authorization Manager... >Oct 28 20:40:10 unused polkitd[733]: Started polkitd version 0.112 >Oct 28 20:40:12 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Oct 28 20:40:12 unused dbus[668]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Oct 28 20:40:12 unused systemd: Started Authorization Manager. >Oct 28 20:40:12 unused accounts-daemon[664]: started daemon version 0.6.35 >Oct 28 20:40:12 unused systemd: Started Accounts Service. >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused kernel: ip_tables: (C) 2000-2006 Netfilter Core Team >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused kernel: nf_conntrack version 0.5.0 (16384 buckets, 65536 max) >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused systemd: Started Dynamic System Tuning Daemon. >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:12 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused kernel: Ebtables v2.0 registered >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused kernel: Bridge firewalling registered >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused systemd: Started firewalld - dynamic firewall daemon. >Oct 28 20:40:13 unused systemd: Starting Network Manager... >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused NetworkManager[899]: <info> NetworkManager (version 0.9.9.1-42.git20140326.4dba720.el7) is starting... >Oct 28 20:40:13 unused NetworkManager[899]: <info> Read config: /etc/NetworkManager/NetworkManager.conf and conf.d: 10-ibft-plugin.conf, 00-server.conf >Oct 28 20:40:13 unused NetworkManager[899]: <info> WEXT support is disabled >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused NetworkManager[899]: <info> VPN: loaded org.freedesktop.NetworkManager.libreswan >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:13 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused NetworkManager[899]: ifcfg-rh: Acquired D-Bus service com.redhat.ifcfgrh1 >Oct 28 20:40:14 unused NetworkManager[899]: <info> Loaded plugin ifcfg-rh: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused NetworkManager[899]: <info> Loaded plugin iBFT: (c) 2014 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 28 20:40:14 unused NetworkManager[899]: <info> Loaded plugin keyfile: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused NetworkManager[899]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 28 20:40:14 unused NetworkManager[899]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-ens5 ... >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused NetworkManager[899]: ifcfg-rh: read connection 'ens5' >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused NetworkManager[899]: <info> monitoring kernel firmware directory '/lib/firmware'. >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused NetworkManager[899]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-adsl.so >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused NetworkManager[899]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-bluetooth.so >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused NetworkManager[899]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-wwan.so >Oct 28 20:40:14 unused NetworkManager[899]: <info> WiFi enabled by radio killswitch; enabled by state file >Oct 28 20:40:14 unused NetworkManager[899]: <info> WWAN enabled by radio killswitch; enabled by state file >Oct 28 20:40:14 unused NetworkManager[899]: <info> WiMAX enabled by radio killswitch; enabled by state file >Oct 28 20:40:14 unused NetworkManager[899]: <info> Networking is enabled by state file >Oct 28 20:40:14 unused systemd: Started Network Manager. >Oct 28 20:40:14 unused NetworkManager[899]: <info> (lo): link connected >Oct 28 20:40:14 unused NetworkManager[899]: <info> (lo): carrier is ON (but ignored) >Oct 28 20:40:14 unused NetworkManager[899]: <info> (lo): new Generic device (driver: 'unknown' ifindex: 1) >Oct 28 20:40:14 unused NetworkManager[899]: <info> (lo): exported as /org/freedesktop/NetworkManager/Devices/0 >Oct 28 20:40:14 unused systemd: Starting LSB: Bring up/down networking... >Oct 28 20:40:14 unused NetworkManager[899]: <info> (ens5): carrier is OFF (but ignored) >Oct 28 20:40:14 unused NetworkManager[899]: <info> (ens5): new Ethernet device (driver: 'e1000' ifindex: 2) >Oct 28 20:40:14 unused NetworkManager[899]: <info> (ens5): exported as /org/freedesktop/NetworkManager/Devices/1 >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused NetworkManager[899]: <info> (ens5): device state change: unmanaged -> unavailable (reason 'managed') [10 20 2] >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused NetworkManager[899]: <info> (ens5): preparing device >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused NetworkManager[899]: <info> (ens5): device state change: unavailable -> disconnected (reason 'none') [20 30 0] >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused kernel: IPv6: ADDRCONF(NETDEV_UP): ens5: link is not ready >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused NetworkManager[899]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 28 20:40:14 unused network: Bringing up loopback interface: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused NetworkManager[899]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 28 20:40:14 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 28 20:40:14 unused dbus[668]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused NetworkManager[899]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:14 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused NetworkManager[899]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 28 20:40:15 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused network: [ OK ] >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused NetworkManager[899]: <warn> Failed to activate 'ens5': Connection 'ens5' is not available on the device ens5 at this time. >Oct 28 20:40:15 unused NetworkManager[899]: <info> NetworkManager state is now DISCONNECTING >Oct 28 20:40:15 unused NetworkManager[899]: <info> NetworkManager state is now DISCONNECTED >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused network: Bringing up interface ens5: Error: Connection activation failed: Connection 'ens5' is not available on the device ens5 at this time. >Oct 28 20:40:15 unused network: [FAILED] >Oct 28 20:40:15 unused systemd: network.service: control process exited, code=exited status=1 >Oct 28 20:40:15 unused systemd: Failed to start LSB: Bring up/down networking. >Oct 28 20:40:15 unused systemd: Unit network.service entered failed state. >Oct 28 20:40:15 unused systemd: Starting Network. >Oct 28 20:40:15 unused systemd: Reached target Network. >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:15 unused audispd: queue is full - dropping event >Oct 28 20:40:16 unused systemd: Started Login and scanning of iSCSI devices. >Oct 28 20:40:16 unused systemd: Starting Remote File Systems (Pre). >Oct 28 20:40:16 unused systemd: Reached target Remote File Systems (Pre). >Oct 28 20:40:16 unused systemd: Starting Remote File Systems. >Oct 28 20:40:16 unused systemd: Reached target Remote File Systems. >Oct 28 20:40:16 unused systemd: Starting Trigger Flushing of Journal to Persistent Storage... >Oct 28 20:40:16 unused systemd: Starting Virtualization daemon... >Oct 28 20:40:16 unused systemd: Starting Enable periodic update of entitlement certificates.... >Oct 28 20:40:16 unused systemd: Starting Crash recovery kernel arming... >Oct 28 20:40:16 unused systemd: Starting Postfix Mail Transport Agent... >Oct 28 20:40:16 unused systemd: Starting OpenSSH server daemon... >Oct 28 20:40:16 unused systemd: Started OpenSSH server daemon. >Oct 28 20:40:16 unused systemd: Starting /etc/rc.d/rc.local Compatibility... >Oct 28 20:40:16 unused systemd: Starting LSB: Starts the Spacewalk Daemon... >Oct 28 20:40:16 unused systemd: Started Enable periodic update of entitlement certificates.. >Oct 28 20:40:16 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 28 20:40:16 unused systemd: Started Trigger Flushing of Journal to Persistent Storage. >Oct 28 20:40:16 unused systemd: Starting Permit User Sessions... >Oct 28 20:40:16 unused rc.local: ens5: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500 >Oct 28 20:40:16 unused rc.local: ether 9a:d4:d5:d6:d7:d8 txqueuelen 1000 (Ethernet) >Oct 28 20:40:16 unused rc.local: RX packets 263 bytes 18286 (17.8 KiB) >Oct 28 20:40:16 unused rc.local: RX errors 0 dropped 0 overruns 0 frame 0 >Oct 28 20:40:16 unused rc.local: TX packets 0 bytes 0 (0.0 B) >Oct 28 20:40:16 unused rc.local: TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >Oct 28 20:40:16 unused rc.local: lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 >Oct 28 20:40:16 unused rc.local: inet 127.0.0.1 netmask 255.0.0.0 >Oct 28 20:40:16 unused rc.local: inet6 ::1 prefixlen 128 scopeid 0x10<host> >Oct 28 20:40:16 unused rc.local: loop txqueuelen 0 (Local Loopback) >Oct 28 20:40:16 unused rc.local: RX packets 12 bytes 1296 (1.2 KiB) >Oct 28 20:40:16 unused rc.local: RX errors 0 dropped 0 overruns 0 frame 0 >Oct 28 20:40:16 unused rc.local: TX packets 12 bytes 1296 (1.2 KiB) >Oct 28 20:40:16 unused rc.local: TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >Oct 28 20:40:16 unused systemd: Started Permit User Sessions. >Oct 28 20:40:16 unused systemd: Starting Command Scheduler... >Oct 28 20:40:16 unused systemd: Started Command Scheduler. >Oct 28 20:40:16 unused systemd: Starting Job spooling tools... >Oct 28 20:40:16 unused systemd: Started Job spooling tools. >Oct 28 20:40:16 unused systemd: Starting GNOME Display Manager... >Oct 28 20:40:16 unused NetworkManager[899]: <info> (ens5): link connected >Oct 28 20:40:16 unused NetworkManager[899]: <info> Auto-activating connection 'ens5'. >Oct 28 20:40:16 unused NetworkManager[899]: <info> Activation (ens5) starting connection 'ens5' >Oct 28 20:40:16 unused NetworkManager[899]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) scheduled... >Oct 28 20:40:16 unused NetworkManager[899]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) started... >Oct 28 20:40:16 unused NetworkManager[899]: <info> (ens5): device state change: disconnected -> prepare (reason 'none') [30 40 0] >Oct 28 20:40:16 unused NetworkManager[899]: <info> NetworkManager state is now CONNECTING >Oct 28 20:40:16 unused NetworkManager[899]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) scheduled... >Oct 28 20:40:16 unused NetworkManager[899]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) complete. >Oct 28 20:40:16 unused NetworkManager[899]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) starting... >Oct 28 20:40:16 unused NetworkManager[899]: <info> (ens5): device state change: prepare -> config (reason 'none') [40 50 0] >Oct 28 20:40:16 unused kernel: e1000: ens5 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX >Oct 28 20:40:16 unused systemd: Started /etc/rc.d/rc.local Compatibility. >Oct 28 20:40:16 unused kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens5: link becomes ready >Oct 28 20:40:16 unused systemd: PID file /var/run/rhnsd.pid not readable (yet?) after start. >Oct 28 20:40:16 unused NetworkManager[899]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) successful. >Oct 28 20:40:16 unused NetworkManager[899]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) complete. >Oct 28 20:40:16 unused systemd: Failed to start LSB: Starts the Spacewalk Daemon. >Oct 28 20:40:16 unused systemd: Unit rhnsd.service entered failed state. >Oct 28 20:40:16 unused systemd: Starting Wait for Plymouth Boot Screen to Quit... >Oct 28 20:40:16 unused setroubleshoot: Plugin Exception restorecon >Oct 28 20:40:16 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ac39f061-ce90-4c09-946c-3113de3c1565 >Oct 28 20:40:16 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:16 unused libvirtd: 2014-10-28 12:40:16.831+0000: 1398: info : libvirt version: 1.2.8, package: 4.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2014-09-26-08:45:32, x86-021.build.eng.bos.redhat.com) >Oct 28 20:40:16 unused libvirtd: 2014-10-28 12:40:16.831+0000: 1398: warning : virGetHostname:665 : getaddrinfo failed for 'unused': Name or service not known >Oct 28 20:40:16 unused systemd: Started GNOME Display Manager. >Oct 28 20:40:16 unused setroubleshoot: Plugin Exception restorecon_source >Oct 28 20:40:16 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ac39f061-ce90-4c09-946c-3113de3c1565 >Oct 28 20:40:16 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:17 unused dbus-daemon: dbus[668]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.17" (uid=0 pid=1931 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.18" (uid=0 pid=1970 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Oct 28 20:40:17 unused dbus[668]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.17" (uid=0 pid=1931 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.18" (uid=0 pid=1970 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Oct 28 20:40:17 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ac39f061-ce90-4c09-946c-3113de3c1565 >Oct 28 20:40:17 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:17 unused kdumpctl: No kdump initial ramdisk found. >Oct 28 20:40:17 unused kdumpctl: Rebuilding /boot/initramfs-3.10.0-175.el7.x86_64kdump.img >Oct 28 20:40:17 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ac39f061-ce90-4c09-946c-3113de3c1565 >Oct 28 20:40:17 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:17 unused NetworkManager[899]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) scheduled. >Oct 28 20:40:17 unused NetworkManager[899]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) started... >Oct 28 20:40:17 unused NetworkManager[899]: <info> (ens5): device state change: config -> ip-config (reason 'none') [50 70 0] >Oct 28 20:40:17 unused NetworkManager[899]: <info> Activation (ens5) Beginning DHCPv4 transaction (timeout in 45 seconds) >Oct 28 20:40:17 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ac39f061-ce90-4c09-946c-3113de3c1565 >Oct 28 20:40:17 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:17 unused NetworkManager[899]: <info> dhclient started with pid 2645 >Oct 28 20:40:17 unused NetworkManager[899]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) complete. >Oct 28 20:40:17 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 39b125f4-9f18-484c-b871-fd1ec27d301a >Oct 28 20:40:17 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:17 unused journal: libvirt version: 1.2.8, package: 4.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2014-09-26-08:45:32, x86-021.build.eng.bos.redhat.com) >Oct 28 20:40:17 unused journal: Module /usr/lib64/libvirt/connection-driver/libvirt_driver_lxc.so not accessible >Oct 28 20:40:17 unused NetworkManager[899]: <info> (ens5): DHCPv4 state changed nbi -> preinit >Oct 28 20:40:17 unused dhclient[2645]: DHCPDISCOVER on ens5 to 255.255.255.255 port 67 interval 4 (xid=0x5a5d827b) >Oct 28 20:40:17 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 28 20:40:17 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:17 unused systemd: Started Virtualization daemon. >Oct 28 20:40:17 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 28 20:40:17 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:18 unused systemd: Started Postfix Mail Transport Agent. >Oct 28 20:40:18 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f60195bb-d64d-4eb0-a8f4-cf8a2b920ac8 >Oct 28 20:40:18 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:18 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5ab16217-4ece-422d-83ed-2d510b7f6e4a >Oct 28 20:40:18 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:18 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l adc127d5-3ba3-4600-a18a-c60d41d563f5 >Oct 28 20:40:18 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:18 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 28 20:40:18 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:18 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 06db745f-002f-4e84-a79a-b463031747bc >Oct 28 20:40:18 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:18 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 06db745f-002f-4e84-a79a-b463031747bc >Oct 28 20:40:18 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:18 unused dhclient[2645]: DHCPREQUEST on ens5 to 255.255.255.255 port 67 (xid=0x5a5d827b) >Oct 28 20:40:18 unused dhclient[2645]: DHCPOFFER from 10.66.111.254 >Oct 28 20:40:18 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 28 20:40:18 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:18 unused dhclient[2645]: DHCPACK from 10.66.111.254 (xid=0x5a5d827b) >Oct 28 20:40:18 unused dhclient[2645]: bound to 10.66.110.85 -- renewal in 5766 seconds. >Oct 28 20:40:18 unused NetworkManager[899]: <info> (ens5): DHCPv4 state changed preinit -> bound >Oct 28 20:40:18 unused NetworkManager[899]: <info> address 10.66.110.85 >Oct 28 20:40:18 unused NetworkManager[899]: <info> plen 21 (255.255.248.0) >Oct 28 20:40:18 unused NetworkManager[899]: <info> gateway 10.66.111.254 >Oct 28 20:40:18 unused NetworkManager[899]: <info> server identifier 10.66.78.111 >Oct 28 20:40:18 unused NetworkManager[899]: <info> lease time 14400 >Oct 28 20:40:18 unused NetworkManager[899]: <info> nameserver '10.66.78.111' >Oct 28 20:40:18 unused NetworkManager[899]: <info> nameserver '10.66.78.117' >Oct 28 20:40:18 unused NetworkManager[899]: <info> nameserver '10.66.127.10' >Oct 28 20:40:18 unused NetworkManager[899]: <info> domain name 'englab.nay.redhat.com' >Oct 28 20:40:18 unused NetworkManager[899]: <info> domain name 'qe.lab.eng.nay.redhat.com' >Oct 28 20:40:18 unused NetworkManager[899]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Configure Commit) scheduled... >Oct 28 20:40:18 unused NetworkManager[899]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Commit) started... >Oct 28 20:40:18 unused avahi-daemon[643]: Joining mDNS multicast group on interface ens5.IPv4 with address 10.66.110.85. >Oct 28 20:40:18 unused avahi-daemon[643]: New relevant interface ens5.IPv4 for mDNS. >Oct 28 20:40:18 unused NetworkManager[899]: <info> (ens5): device state change: ip-config -> ip-check (reason 'none') [70 80 0] >Oct 28 20:40:18 unused avahi-daemon[643]: Registering new address record for 10.66.110.85 on ens5.IPv4. >Oct 28 20:40:18 unused NetworkManager[899]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Commit) complete. >Oct 28 20:40:18 unused NetworkManager[899]: <info> (ens5): device state change: ip-check -> secondaries (reason 'none') [80 90 0] >Oct 28 20:40:18 unused NetworkManager[899]: <info> (ens5): device state change: secondaries -> activated (reason 'none') [90 100 0] >Oct 28 20:40:18 unused NetworkManager[899]: <info> NetworkManager state is now CONNECTED_LOCAL >Oct 28 20:40:18 unused NetworkManager[899]: <info> Policy set 'ens5' (ens5) as default for IPv4 routing and DNS. >Oct 28 20:40:18 unused NetworkManager[899]: <info> Activation (ens5) successful, device activated. >Oct 28 20:40:18 unused dracut: dracut- >Oct 28 20:40:18 unused dbus-daemon: dbus[668]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Oct 28 20:40:18 unused dbus[668]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Oct 28 20:40:18 unused systemd: Starting Network Manager Script Dispatcher Service... >Oct 28 20:40:18 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Oct 28 20:40:18 unused dbus[668]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Oct 28 20:40:18 unused systemd: Started Network Manager Script Dispatcher Service. >Oct 28 20:40:18 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8a2839f5-9652-4d11-b7f0-45cf9ee50720 >Oct 28 20:40:19 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:19 unused systemd: Unit iscsi.service cannot be reloaded because it is inactive. >Oct 28 20:40:19 unused dracut: Executing: /usr/sbin/dracut --hostonly --hostonly-cmdline -o "plymouth dash resume" -f /boot/initramfs-3.10.0-175.el7.x86_64kdump.img 3.10.0-175.el7.x86_64 >Oct 28 20:40:19 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 28 20:40:19 unused avahi-daemon[643]: Registering new address record for fe80::98d4:d5ff:fed6:d7d8 on ens5.*. >Oct 28 20:40:19 unused systemd: Started Wait for Plymouth Boot Screen to Quit. >Oct 28 20:40:19 unused systemd: Starting Serial Getty on ttyS0... >Oct 28 20:40:19 unused systemd: Started Serial Getty on ttyS0. >Oct 28 20:40:19 unused systemd: Starting Login Prompts. >Oct 28 20:40:19 unused systemd: Reached target Login Prompts. >Oct 28 20:40:19 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:19 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 28 20:40:19 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:19 unused systemd: Starting user-993.slice. >Oct 28 20:40:19 unused systemd: Created slice user-993.slice. >Oct 28 20:40:19 unused systemd: Starting Session c1 of user gnome-initial-setup. >Oct 28 20:40:19 unused systemd: Started Session c1 of user gnome-initial-setup. >Oct 28 20:40:19 unused systemd-logind: New session c1 of user gnome-initial-setup. >Oct 28 20:40:19 unused systemd-logind: Linked /tmp/.X11-unix/X0 to /run/user/993/X11-display. >Oct 28 20:40:19 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l bb129500-3477-472a-b1a1-1b7d123c1da8 >Oct 28 20:40:19 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:20 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d95da5c3-8c53-450d-a9b2-dfb19b652de8 >Oct 28 20:40:20 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:20 unused dracut: dracut module 'plymouth' will not be installed, because it's in the list to be omitted! >Oct 28 20:40:20 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l db8f5c38-2bac-4875-a619-b204531cc812 >Oct 28 20:40:20 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:20 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 149193bb-28ed-4b94-9604-5e107a9da7e2 >Oct 28 20:40:20 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:20 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2003831-eae3-45bc-9b03-1dd96a73f949 >Oct 28 20:40:20 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:20 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d95da5c3-8c53-450d-a9b2-dfb19b652de8 >Oct 28 20:40:20 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:20 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 28 20:40:20 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:20 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5ab16217-4ece-422d-83ed-2d510b7f6e4a >Oct 28 20:40:20 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:20 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 28 20:40:21 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:21 unused dracut: dracut module 'resume' will not be installed, because it's in the list to be omitted! >Oct 28 20:40:21 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 41005440-a55b-4233-93f3-db86ea99daba >Oct 28 20:40:21 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:21 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l af15d032-e5b6-477a-a4e0-d0db84c92e84 >Oct 28 20:40:21 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:21 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l af15d032-e5b6-477a-a4e0-d0db84c92e84 >Oct 28 20:40:21 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:21 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 75ef4f58-c198-49a6-9668-ae14c8a7007b >Oct 28 20:40:21 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:21 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b91b4263-e2c9-413f-9c5f-7869cacdb578 >Oct 28 20:40:21 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:21 unused NetworkManager[899]: <info> startup complete >Oct 28 20:40:21 unused dbus-daemon: dbus[668]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Oct 28 20:40:21 unused dbus[668]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Oct 28 20:40:21 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 97aea7ca-00fe-4e40-af8e-e0ec40282528 >Oct 28 20:40:21 unused systemd: Starting Daemon for power management... >Oct 28 20:40:21 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:21 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.freedesktop.UPower' >Oct 28 20:40:21 unused dbus[668]: [system] Successfully activated service 'org.freedesktop.UPower' >Oct 28 20:40:21 unused systemd: Started Daemon for power management. >Oct 28 20:40:21 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 94cf47a7-5a5c-405c-ab69-1601b787f238 >Oct 28 20:40:21 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:21 unused gnome-session: (gnome-settings-daemon:5277): power-plugin-WARNING **: failed to turn the panel on: Display is not DPMS capable >Oct 28 20:40:22 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 05d5fa63-cbd7-453f-b673-c378b16914f0 >Oct 28 20:40:22 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:22 unused dracut: *** Including module: bash *** >Oct 28 20:40:22 unused dracut: *** Including module: i18n *** >Oct 28 20:40:22 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 28 20:40:22 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:22 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 28 20:40:22 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:22 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 28 20:40:22 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:22 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8a64fd6d-c54b-4627-b7b5-44f0b14979dd >Oct 28 20:40:22 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:22 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 396a1310-4088-41c8-90a8-d43b4f19499c >Oct 28 20:40:22 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:22 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 396a1310-4088-41c8-90a8-d43b4f19499c >Oct 28 20:40:22 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:22 unused dbus-daemon: dbus[668]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Oct 28 20:40:22 unused dbus[668]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Oct 28 20:40:22 unused systemd: Starting Manage, Install and Generate Color Profiles... >Oct 28 20:40:22 unused gnome-session: gnome-session[4508]: GLib-CRITICAL: g_environ_setenv: assertion 'value != NULL' failed >Oct 28 20:40:22 unused gnome-session[4508]: GLib-CRITICAL: g_environ_setenv: assertion 'value != NULL' failed >Oct 28 20:40:22 unused gnome-session: Entering running state >Oct 28 20:40:23 unused colord: Using config file /etc/colord.conf >Oct 28 20:40:23 unused colord: Using mapping database file /var/lib/colord/mapping.db >Oct 28 20:40:23 unused colord: Using device database file /var/lib/colord/storage.db >Oct 28 20:40:23 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d772382b-e332-4fba-8873-f558166b6023 >Oct 28 20:40:23 unused colord: loaded plugin libcd_plugin_camera.so >Oct 28 20:40:23 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:23 unused colord: loaded plugin libcd_plugin_scanner.so >Oct 28 20:40:23 unused colord: Daemon ready for requests >Oct 28 20:40:23 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Oct 28 20:40:23 unused dbus[668]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Oct 28 20:40:23 unused systemd: Started Manage, Install and Generate Color Profiles. >Oct 28 20:40:23 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2094586-a8f8-4bc1-af02-534887cfd2f4 >Oct 28 20:40:23 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:23 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2094586-a8f8-4bc1-af02-534887cfd2f4 >Oct 28 20:40:23 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:23 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0b13c0cf-312e-4166-b485-88d815f566fb >Oct 28 20:40:23 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:23 unused colord: Profile added: icc-021ec903471f953c28c57ccde43f9134 >Oct 28 20:40:23 unused colord: Profile added: icc-7e1e684edc9a0671f5305d656d8cb8c9 >Oct 28 20:40:23 unused colord: Profile added: icc-0f6451e33e7342d0f90bb960912bb812 >Oct 28 20:40:23 unused colord: Profile added: icc-8f465237bb45ee1d16fdbd6b4038c719 >Oct 28 20:40:23 unused colord: Profile added: icc-8daff74b7142df23f76b3d5ef126bbf9 >Oct 28 20:40:23 unused colord: Profile added: icc-f16a3fe7a0d2f471188cf45202ae43ac >Oct 28 20:40:23 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b427ecb2-8229-4dc3-b9ee-ffea01dcd104 >Oct 28 20:40:23 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:23 unused rtkit-daemon[665]: Successfully made thread 5925 of process 5925 (/usr/bin/pulseaudio) owned by '993' high priority at nice level -11. >Oct 28 20:40:23 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 28 20:40:23 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:23 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0e7f911c-862c-4a1b-bdef-924387d5c7e9 >Oct 28 20:40:23 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:23 unused dbus-daemon: dbus[668]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' >Oct 28 20:40:23 unused dbus[668]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' >Oct 28 20:40:23 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 28 20:40:23 unused systemd: Starting Bluetooth service... >Oct 28 20:40:23 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:24 unused bluetoothd: bluetoothd[5954]: Bluetooth daemon 4.101 >Oct 28 20:40:24 unused bluetoothd[5954]: Bluetooth daemon 4.101 >Oct 28 20:40:24 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.bluez' >Oct 28 20:40:24 unused dbus-daemon: dbus[668]: [system] Rejected send message, 2 matched rules; type="method_call", sender=":1.31" (uid=993 pid=5925 comm="/usr/bin/pulseaudio --start --log-target=syslog ") interface="org.bluez.Manager" member="GetProperties" error name="(unset)" requested_reply="0" destination="org.bluez" (uid=0 pid=5954 comm="/usr/sbin/bluetoothd -n ") >Oct 28 20:40:24 unused dbus[668]: [system] Successfully activated service 'org.bluez' >Oct 28 20:40:24 unused dbus[668]: [system] Rejected send message, 2 matched rules; type="method_call", sender=":1.31" (uid=993 pid=5925 comm="/usr/bin/pulseaudio --start --log-target=syslog ") interface="org.bluez.Manager" member="GetProperties" error name="(unset)" requested_reply="0" destination="org.bluez" (uid=0 pid=5954 comm="/usr/sbin/bluetoothd -n ") >Oct 28 20:40:24 unused systemd: Started Bluetooth service. >Oct 28 20:40:24 unused bluetoothd: D-Bus setup failed: Rejected send message, 2 matched rules; type="method_call", sender=":1.31" (uid=993 pid=5925 comm="/usr/bin/pulseaudio --start --log-target=syslog ") interface="org.bluez.Manager" member="GetProperties" error name="(unset)" requested_reply="0" destination="org.bluez" (uid=0 pid=5954 comm="/usr/sbin/bluetoothd -n ") >Oct 28 20:40:24 unused bluetoothd: bluetoothd[5954]: Unable to get on D-Bus >Oct 28 20:40:24 unused bluetoothd[5954]: Unable to get on D-Bus >Oct 28 20:40:24 unused dbus-daemon: dbus[668]: [system] Rejected send message, 2 matched rules; type="method_call", sender=":1.31" (uid=993 pid=5925 comm="/usr/bin/pulseaudio --start --log-target=syslog ") interface="org.bluez.Manager" member="GetProperties" error name="(unset)" requested_reply="0" destination="org.bluez" (uid=0 pid=5954 comm="/usr/sbin/bluetoothd -n ") >Oct 28 20:40:24 unused dbus[668]: [system] Rejected send message, 2 matched rules; type="method_call", sender=":1.31" (uid=993 pid=5925 comm="/usr/bin/pulseaudio --start --log-target=syslog ") interface="org.bluez.Manager" member="GetProperties" error name="(unset)" requested_reply="0" destination="org.bluez" (uid=0 pid=5954 comm="/usr/sbin/bluetoothd -n ") >Oct 28 20:40:24 unused pulseaudio[5925]: [pulseaudio] bluetooth-util.c: org.bluez.Manager.GetProperties() failed: org.freedesktop.DBus.Error.AccessDenied: Rejected send message, 2 matched rules; type="method_call", sender=":1.31" (uid=993 pid=5925 comm="/usr/bin/pulseaudio --start --log-target=syslog ") interface="org.bluez.Manager" member="GetProperties" error name="(unset)" requested_reply="0" destination="org.bluez" (uid=0 pid=5954 comm="/usr/sbin/bluetoothd -n ") >Oct 28 20:40:24 unused systemd: bluetooth.service: main process exited, code=exited, status=1/FAILURE >Oct 28 20:40:24 unused systemd: Unit bluetooth.service entered failed state. >Oct 28 20:40:24 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 04b4c9d6-e337-439c-bb70-255a7898dcb3 >Oct 28 20:40:24 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:24 unused dracut: *** Including module: network *** >Oct 28 20:40:24 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 28 20:40:24 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:24 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5f10f707-7a84-461f-9e81-f835d4ea195d >Oct 28 20:40:24 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:24 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 28 20:40:24 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:24 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0e378e0b-9b3c-4d2f-84b9-ce2845665953 >Oct 28 20:40:24 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:24 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b94cfdf3-87b2-4b6e-abf5-837aee9d5e47 >Oct 28 20:40:24 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:24 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 28 20:40:24 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:25 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 829d18ca-3d16-4e5a-8496-a95d9ab10d6c >Oct 28 20:40:25 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:25 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 63dc4b7a-9372-4551-bd5d-9f0980157bc4 >Oct 28 20:40:25 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:25 unused dracut: *** Including module: ifcfg *** >Oct 28 20:40:25 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l be15d920-943b-4dae-ab10-813bdf4c9056 >Oct 28 20:40:25 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:25 unused dracut: *** Including module: drm *** >Oct 28 20:40:25 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 28 20:40:25 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:25 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f31e2e16-ef9a-43df-bba1-a28015fc34cb >Oct 28 20:40:25 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:25 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 28 20:40:25 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:25 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f31e2e16-ef9a-43df-bba1-a28015fc34cb >Oct 28 20:40:25 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:26 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 28 20:40:26 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:26 unused dracut: *** Including module: dm *** >Oct 28 20:40:26 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 28 20:40:26 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:26 unused dracut: Skipping udev rule: 64-device-mapper.rules >Oct 28 20:40:26 unused dracut: Skipping udev rule: 60-persistent-storage-dm.rules >Oct 28 20:40:26 unused dracut: Skipping udev rule: 55-dm.rules >Oct 28 20:40:26 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 28 20:40:26 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:26 unused dracut: *** Including module: kernel-modules *** >Oct 28 20:40:26 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 28 20:40:26 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:26 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 28 20:40:26 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:26 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 88a7869a-040a-4f0e-80c5-b6a4e8755bb3 >Oct 28 20:40:26 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:26 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 28 20:40:26 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:26 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 28 20:40:26 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:27 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l dc7e7c9b-7e67-4b25-821f-418ef1def3e4 >Oct 28 20:40:27 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:27 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 28 20:40:27 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:27 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 28 20:40:27 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:27 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 28 20:40:27 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:27 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8dd8c574-fc63-4b6f-9f6c-45c2df7870d4 >Oct 28 20:40:27 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:27 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 28 20:40:27 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:27 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 3ed0fa73-53ef-48c0-bb88-c1fd8f856461 >Oct 28 20:40:27 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:27 unused gnome-session: (gnome-initial-setup:5847): GLib-CRITICAL **: g_variant_get_string: assertion 'value != NULL' failed >Oct 28 20:40:27 unused gnome-session: (gnome-initial-setup:5847): GLib-CRITICAL **: g_variant_unref: assertion 'value != NULL' failed >Oct 28 20:40:28 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 28 20:40:28 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:28 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 09b5d932-cb7c-437e-91a6-6974b4c93776 >Oct 28 20:40:28 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:28 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 28 20:40:28 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:28 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 98ea1afc-59d0-4098-9242-9081c4f9d267 >Oct 28 20:40:28 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:28 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 28 20:40:28 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:28 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 28 20:40:28 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:28 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 738a2d2b-428d-45d3-8f5e-d41a2afc11d8 >Oct 28 20:40:28 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:28 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 9878a828-5444-43bc-a490-b4d4e1388639 >Oct 28 20:40:28 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:29 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 9cc0fe59-8f40-4d6f-8c08-0448ab744118 >Oct 28 20:40:29 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:29 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 9cc0fe59-8f40-4d6f-8c08-0448ab744118 >Oct 28 20:40:29 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:29 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 28 20:40:29 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:29 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l fb8c3ec1-a18b-43da-9992-ed132b321ec0 >Oct 28 20:40:29 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:40:29 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8cc50dab-08dc-438e-9279-13d6f3e71a93 >Oct 28 20:40:29 unused dbus-daemon: string index out of range >Oct 28 20:40:29 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 28 20:40:30 unused gnome-session: (gnome-initial-setup:5847): GLib-CRITICAL **: g_variant_get_string: assertion 'value != NULL' failed >Oct 28 20:40:30 unused gnome-session: (gnome-initial-setup:5847): GLib-CRITICAL **: g_variant_unref: assertion 'value != NULL' failed >Oct 28 20:40:30 unused gnome-session: (gnome-initial-setup:5847): GLib-GIO-CRITICAL **: g_dbus_proxy_call_internal: assertion 'G_IS_DBUS_PROXY (proxy)' failed >Oct 28 20:40:30 unused dbus-daemon: Exception in thread Thread-1 (most likely raised during interpreter shutdown):dbus[668]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 28 20:40:30 unused dbus[668]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 28 20:40:30 unused systemd: Starting Locale Service... >Oct 28 20:40:30 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 28 20:40:30 unused dbus[668]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 28 20:40:30 unused systemd: Started Locale Service. >Oct 28 20:40:30 unused NetworkManager[899]: <info> NetworkManager state is now CONNECTED_GLOBAL >Oct 28 20:40:30 unused dbus-daemon: dbus[668]: [system] Activating via systemd: service name='org.freedesktop.timedate1' unit='dbus-org.freedesktop.timedate1.service' >Oct 28 20:40:30 unused dbus[668]: [system] Activating via systemd: service name='org.freedesktop.timedate1' unit='dbus-org.freedesktop.timedate1.service' >Oct 28 20:40:30 unused systemd: Starting Time & Date Service... >Oct 28 20:40:30 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.freedesktop.timedate1' >Oct 28 20:40:30 unused dbus[668]: [system] Successfully activated service 'org.freedesktop.timedate1' >Oct 28 20:40:30 unused systemd: Started Time & Date Service. >Oct 28 20:40:31 unused goa[8127]: goa-daemon version 3.8.5 starting [main.c:113, main()] >Oct 28 20:40:31 unused goa[8127]: GoaKerberosIdentityManager: Using polling for change notification for credential cache type 'KEYRING' [goakerberosidentitymanager.c:1386, monitor_credentials_cache()] >Oct 28 20:40:33 unused dbus-daemon: dbus[668]: [system] Activating service name='org.freedesktop.realmd' (using servicehelper) >Oct 28 20:40:33 unused dbus[668]: [system] Activating service name='org.freedesktop.realmd' (using servicehelper) >Oct 28 20:40:33 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.freedesktop.realmd' >Oct 28 20:40:33 unused dbus[668]: [system] Successfully activated service 'org.freedesktop.realmd' >Oct 28 20:40:33 unused realmd: * Resolving: _ldap._tcp.englab.nay.redhat.com qe.lab.eng.nay.redhat.com >Oct 28 20:40:33 unused gnome-session: * Resolving: _ldap._tcp.englab.nay.redhat.com qe.lab.eng.nay.redhat.com >Oct 28 20:40:33 unused realmd: * Resolving: englab.nay.redhat.com qe.lab.eng.nay.redhat.com >Oct 28 20:40:33 unused gnome-session: * Resolving: englab.nay.redhat.com qe.lab.eng.nay.redhat.com >Oct 28 20:40:33 unused realmd: * No results: englab.nay.redhat.com qe.lab.eng.nay.redhat.com >Oct 28 20:40:33 unused gnome-session: * No results: englab.nay.redhat.com qe.lab.eng.nay.redhat.com >Oct 28 20:40:33 unused dracut: *** Including module: lvm *** >Oct 28 20:40:33 unused dracut: Skipping udev rule: 64-device-mapper.rules >Oct 28 20:40:33 unused dracut: Skipping udev rule: 56-lvm.rules >Oct 28 20:40:33 unused dracut: Skipping udev rule: 60-persistent-storage-lvm.rules >Oct 28 20:40:33 unused dracut: *** Including module: fcoe *** >Oct 28 20:40:34 unused dracut: *** Including module: fcoe-uefi *** >Oct 28 20:40:34 unused dracut: *** Including module: rootfs-block *** >Oct 28 20:40:34 unused dracut: *** Including module: terminfo *** >Oct 28 20:40:34 unused dracut: *** Including module: udev-rules *** >Oct 28 20:40:34 unused dracut: Skipping udev rule: 91-permissions.rules >Oct 28 20:40:34 unused dracut: *** Including module: biosdevname *** >Oct 28 20:40:34 unused dracut: *** Including module: systemd *** >Oct 28 20:40:34 unused dracut: *** Including module: usrmount *** >Oct 28 20:40:34 unused dracut: *** Including module: base *** >Oct 28 20:40:35 unused dracut: *** Including module: fs-lib *** >Oct 28 20:40:35 unused dracut: *** Including module: kdumpbase *** >Oct 28 20:40:35 unused dracut: *** Including module: shutdown *** >Oct 28 20:40:35 unused dracut: *** Including module: uefi-lib *** >Oct 28 20:40:35 unused dracut: *** Including modules done *** >Oct 28 20:40:35 unused dracut: *** Installing kernel module dependencies and firmware *** >Oct 28 20:40:36 unused dracut: *** Installing kernel module dependencies and firmware done *** >Oct 28 20:40:36 unused dracut: *** Resolving executable dependencies *** >Oct 28 20:40:37 unused dracut: *** Resolving executable dependencies done*** >Oct 28 20:40:37 unused dracut: *** Pre-linking files *** >Oct 28 20:40:37 unused dracut: *** Pre-linking files done *** >Oct 28 20:40:37 unused dracut: *** Hardlinking files *** >Oct 28 20:40:37 unused dracut: *** Hardlinking files done *** >Oct 28 20:40:37 unused dracut: *** Stripping files *** >Oct 28 20:40:37 unused dracut: *** Stripping files done *** >Oct 28 20:40:37 unused dracut: *** Generating early-microcode cpio image *** >Oct 28 20:40:38 unused dracut: *** Constructing GenuineIntel.bin **** >Oct 28 20:40:38 unused dracut: *** Store current command line parameters *** >Oct 28 20:40:38 unused dracut: *** Creating image file *** >Oct 28 20:40:48 unused dbus-daemon: dbus[668]: [system] Failed to activate service 'org.bluez': timed out >Oct 28 20:40:48 unused dbus[668]: [system] Failed to activate service 'org.bluez': timed out >Oct 28 20:40:48 unused pulseaudio[5925]: [pulseaudio] bluetooth-util.c: org.bluez.Manager.GetProperties() failed: org.freedesktop.DBus.Error.TimedOut: Activation of org.bluez timed out >Oct 28 20:40:49 unused rtkit-daemon[665]: Successfully made thread 11265 of process 11265 (/usr/bin/pulseaudio) owned by '993' high priority at nice level -11. >Oct 28 20:40:49 unused pulseaudio[11265]: [pulseaudio] pid.c: Daemon already running. >Oct 28 20:40:49 unused gnome-session: (gnome-settings-daemon:5277): color-plugin-WARNING **: failed to get edid: unable to get EDID for output >Oct 28 20:40:49 unused colord: Device added: xrandr-Virtual-0 >Oct 28 20:40:49 unused gnome-session: (gnome-settings-daemon:5277): keyboard-plugin-WARNING **: Unhandled settings change, key 'input-sources-switcher' >Oct 28 20:40:49 unused gnome-session: (gnome-settings-daemon:5277): keyboard-plugin-WARNING **: Unhandled settings change, key 'bell-custom-file' >Oct 28 20:40:49 unused gnome-session: (gnome-settings-daemon:5277): color-plugin-WARNING **: unable to get EDID for xrandr-Virtual-0: unable to get EDID for output >Oct 28 20:40:49 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::primary after class was initialised >Oct 28 20:40:49 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::index after class was initialised >Oct 28 20:40:50 unused dracut: *** Creating image file done *** >Oct 28 20:40:50 unused kdumpctl: cat: write error: Broken pipe >Oct 28 20:40:51 unused gnome-session: JS LOG: GNOME Shell started at Tue Oct 28 2014 20:40:51 GMT+0800 (CST) >Oct 28 20:40:56 unused kdumpctl: kexec: loaded kdump kernel >Oct 28 20:40:56 unused kdumpctl: Starting kdump: [OK] >Oct 28 20:40:56 unused systemd: Started Crash recovery kernel arming. >Oct 28 20:40:56 unused systemd: Starting Multi-User System. >Oct 28 20:40:56 unused systemd: Reached target Multi-User System. >Oct 28 20:40:56 unused systemd: Starting Graphical Interface. >Oct 28 20:40:56 unused systemd: Reached target Graphical Interface. >Oct 28 20:40:56 unused systemd: Starting Update UTMP about System Runlevel Changes... >Oct 28 20:40:56 unused systemd: Started Stop Read-Ahead Data Collection 10s After Completed Startup. >Oct 28 20:40:56 unused systemd: Started Update UTMP about System Runlevel Changes. >Oct 28 20:40:56 unused systemd: Startup finished in 812ms (kernel) + 2.061s (initrd) + 1min 15.311s (userspace) = 1min 18.185s. >Oct 28 20:43:24 unused chronyd[671]: Selected source 10.5.26.10 >Oct 28 20:50:01 unused dbus-daemon: dbus[668]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 28 20:50:01 unused dbus[668]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 28 20:50:01 unused systemd: Starting user-0.slice. >Oct 28 20:50:01 unused systemd: Created slice user-0.slice. >Oct 28 20:50:01 unused systemd: Starting Session 1 of user root. >Oct 28 20:50:01 unused systemd: Started Session 1 of user root. >Oct 28 20:50:01 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 28 20:50:01 unused dbus[668]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 28 20:50:01 unused journal: Suppressed 3333 messages from /system.slice/dbus.service >Oct 28 20:50:02 unused setroubleshoot: Plugin Exception restorecon_source >Oct 28 20:50:02 unused setroubleshoot: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . For complete SELinux messages. run sealert -l 48fca7c8-976d-46e5-9bdc-8be5be60840d >Oct 28 20:50:02 unused python: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that prelink should be allowed setattr access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 20:50:12 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 28 20:54:38 unused systemd: Starting Cleanup of Temporary Directories... >Oct 28 20:54:38 unused systemd: Started Cleanup of Temporary Directories. >Oct 28 21:00:01 unused dbus-daemon: dbus[668]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 28 21:00:01 unused dbus[668]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 28 21:00:01 unused systemd: Created slice user-0.slice. >Oct 28 21:00:01 unused systemd: Starting Session 2 of user root. >Oct 28 21:00:01 unused systemd: Started Session 2 of user root. >Oct 28 21:00:01 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 28 21:00:01 unused dbus[668]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 28 21:00:02 unused setroubleshoot: Plugin Exception restorecon_source >Oct 28 21:00:02 unused setroubleshoot: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . For complete SELinux messages. run sealert -l 48fca7c8-976d-46e5-9bdc-8be5be60840d >Oct 28 21:00:02 unused python: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that prelink should be allowed setattr access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 21:00:12 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 28 21:01:01 unused dbus-daemon: dbus[668]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 28 21:01:01 unused dbus[668]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 28 21:01:01 unused systemd: Created slice user-0.slice. >Oct 28 21:01:01 unused systemd: Starting Session 3 of user root. >Oct 28 21:01:01 unused systemd: Started Session 3 of user root. >Oct 28 21:01:01 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 28 21:01:01 unused dbus[668]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 28 21:01:02 unused setroubleshoot: Plugin Exception restorecon_source >Oct 28 21:01:02 unused setroubleshoot: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . For complete SELinux messages. run sealert -l 48fca7c8-976d-46e5-9bdc-8be5be60840d >Oct 28 21:01:02 unused python: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that prelink should be allowed setattr access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 21:01:12 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 28 21:10:01 unused dbus-daemon: dbus[668]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 28 21:10:01 unused dbus[668]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 28 21:10:01 unused systemd: Starting Session 4 of user root. >Oct 28 21:10:01 unused systemd: Started Session 4 of user root. >Oct 28 21:10:01 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 28 21:10:01 unused dbus[668]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 28 21:10:02 unused setroubleshoot: Plugin Exception restorecon_source >Oct 28 21:10:02 unused setroubleshoot: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . For complete SELinux messages. run sealert -l 48fca7c8-976d-46e5-9bdc-8be5be60840d >Oct 28 21:10:02 unused python: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that prelink should be allowed setattr access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 21:10:12 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 28 21:19:36 unused dbus-daemon: dbus[668]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 28 21:19:36 unused dbus[668]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 28 21:19:36 unused rhsmd: In order for Subscription Manager to provide your system with updates, your system must be registered with the Customer Portal. Please enter your Red Hat login to ensure your system is up-to-date. >Oct 28 21:19:36 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 28 21:19:36 unused dbus[668]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 28 21:19:37 unused setroubleshoot: Plugin Exception restorecon_source >Oct 28 21:19:37 unused setroubleshoot: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . For complete SELinux messages. run sealert -l 15b8d1c7-b792-44db-bc19-e35624af61a0 >Oct 28 21:19:37 unused python: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that prelink should be allowed setattr access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 21:19:37 unused setroubleshoot: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . For complete SELinux messages. run sealert -l 15b8d1c7-b792-44db-bc19-e35624af61a0 >Oct 28 21:19:37 unused python: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that prelink should be allowed setattr access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 21:19:47 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 28 21:20:01 unused dbus-daemon: dbus[668]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 28 21:20:01 unused dbus[668]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 28 21:20:01 unused systemd: Starting Session 5 of user root. >Oct 28 21:20:01 unused systemd: Started Session 5 of user root. >Oct 28 21:20:02 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 28 21:20:02 unused dbus[668]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 28 21:20:03 unused setroubleshoot: Plugin Exception restorecon_source >Oct 28 21:20:03 unused setroubleshoot: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . For complete SELinux messages. run sealert -l 48fca7c8-976d-46e5-9bdc-8be5be60840d >Oct 28 21:20:03 unused python: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that prelink should be allowed setattr access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 28 21:20:12 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 28 21:21:42 unused systemd-logind: Power key pressed. >Oct 28 21:22:20 unused dbus-daemon: dbus[668]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 28 21:22:20 unused dbus[668]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 28 21:22:20 unused systemd: Starting Locale Service... >Oct 28 21:22:20 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 28 21:22:20 unused dbus[668]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 28 21:22:20 unused systemd: Started Locale Service. >Oct 28 21:23:01 unused gnome-session: ** (gnome-initial-setup:5847): CRITICAL **: gis_page_apply_complete: assertion 'page->priv->applying == TRUE' failed >Oct 28 21:23:10 unused systemd: Starting user-1000.slice. >Oct 28 21:23:10 unused systemd: Created slice user-1000.slice. >Oct 28 21:23:10 unused systemd: Starting Session 6 of user licong. >Oct 28 21:23:10 unused systemd-logind: New session 6 of user licong. >Oct 28 21:23:10 unused systemd-logind: Linked /tmp/.X11-unix/X0 to /run/user/1000/X11-display. >Oct 28 21:23:10 unused systemd: Started Session 6 of user licong. >Oct 28 21:23:10 unused gnome-session: Window manager warning: CurrentTime used to choose focus window; focus window may not be correct. >Oct 28 21:23:10 unused gnome-session: Window manager warning: Got a request to focus the no_focus_window with a timestamp of 0. This shouldn't happen! >Oct 28 21:23:10 unused gnome-session: g_dbus_connection_real_closed: Remote peer vanished with error: Underlying GIOStream returned 0 bytes on an async read (g-io-error-quark, 0). Exiting. >Oct 28 21:23:10 unused gnome-keyring-daemon[14756]: g_dbus_connection_real_closed: Remote peer vanished with error: Underlying GIOStream returned 0 bytes on an async read (g-io-error-quark, 0). Exiting. >Oct 28 21:23:10 unused colord: device removed: xrandr-Virtual-0 >Oct 28 21:23:10 unused gdm: Child process -4508 was already dead. >Oct 28 21:23:10 unused /etc/gdm/Xsession: Attempting to create directory /home/licong/perl5 >Oct 28 21:23:11 unused kernel: fuse init (API version 7.22) >Oct 28 21:23:11 unused systemd: Mounting FUSE Control File System... >Oct 28 21:23:11 unused systemd: Mounted FUSE Control File System. >Oct 28 21:23:11 unused gnome-session: (gnome-settings-daemon:22622): power-plugin-WARNING **: failed to turn the panel on: Display is not DPMS capable >Oct 28 21:23:11 unused gnome-session: GNOME_KEYRING_CONTROL=/run/user/1000/keyring-UQvAMp >Oct 28 21:23:11 unused gnome-session: GPG_AGENT_INFO=/run/user/1000/keyring-UQvAMp/gpg:0:1 >Oct 28 21:23:11 unused gnome-session: GNOME_KEYRING_CONTROL=/run/user/1000/keyring-UQvAMp >Oct 28 21:23:11 unused gnome-session: GPG_AGENT_INFO=/run/user/1000/keyring-UQvAMp/gpg:0:1 >Oct 28 21:23:11 unused gnome-session: GNOME_KEYRING_CONTROL=/run/user/1000/keyring-UQvAMp >Oct 28 21:23:11 unused gnome-session: GPG_AGENT_INFO=/run/user/1000/keyring-UQvAMp/gpg:0:1 >Oct 28 21:23:11 unused gnome-session: SSH_AUTH_SOCK=/run/user/1000/keyring-UQvAMp/ssh >Oct 28 21:23:11 unused gnome-session: GNOME_KEYRING_CONTROL=/run/user/1000/keyring-UQvAMp >Oct 28 21:23:11 unused gnome-session: GPG_AGENT_INFO=/run/user/1000/keyring-UQvAMp/gpg:0:1 >Oct 28 21:23:11 unused dbus-daemon: dbus[668]: [system] Activating via systemd: service name='org.freedesktop.UDisks2' unit='udisks2.service' >Oct 28 21:23:11 unused dbus[668]: [system] Activating via systemd: service name='org.freedesktop.UDisks2' unit='udisks2.service' >Oct 28 21:23:11 unused systemd: Starting Disk Manager... >Oct 28 21:23:11 unused udisksd[22671]: udisks daemon version 2.1.2 starting >Oct 28 21:23:11 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.freedesktop.UDisks2' >Oct 28 21:23:11 unused dbus[668]: [system] Successfully activated service 'org.freedesktop.UDisks2' >Oct 28 21:23:11 unused udisksd[22671]: Acquired the name org.freedesktop.UDisks2 on the system message bus >Oct 28 21:23:11 unused systemd: Started Disk Manager. >Oct 28 21:23:11 unused goa[22696]: goa-daemon version 3.8.5 starting [main.c:113, main()] >Oct 28 21:23:11 unused goa[22696]: GoaKerberosIdentityManager: Using polling for change notification for credential cache type 'KEYRING' [goakerberosidentitymanager.c:1386, monitor_credentials_cache()] >Oct 28 21:23:11 unused dbus-daemon: dbus[668]: [system] Activating service name='org.freedesktop.PackageKit' (using servicehelper) >Oct 28 21:23:11 unused dbus[668]: [system] Activating service name='org.freedesktop.PackageKit' (using servicehelper) >Oct 28 21:23:11 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.freedesktop.PackageKit' >Oct 28 21:23:11 unused dbus[668]: [system] Successfully activated service 'org.freedesktop.PackageKit' >Oct 28 21:23:11 unused rtkit-daemon[665]: Successfully made thread 22725 of process 22725 (/usr/bin/pulseaudio) owned by '1000' high priority at nice level -11. >Oct 28 21:23:11 unused dbus-daemon: dbus[668]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' >Oct 28 21:23:11 unused dbus[668]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' >Oct 28 21:23:11 unused systemd: Starting Bluetooth service... >Oct 28 21:23:11 unused bluetoothd: bluetoothd[22735]: Bluetooth daemon 4.101 >Oct 28 21:23:11 unused bluetoothd[22735]: Bluetooth daemon 4.101 >Oct 28 21:23:11 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.bluez' >Oct 28 21:23:11 unused dbus[668]: [system] Successfully activated service 'org.bluez' >Oct 28 21:23:11 unused systemd: Started Bluetooth service. >Oct 28 21:23:11 unused dbus-daemon: dbus[668]: [system] Rejected send message, 2 matched rules; type="method_call", sender=":1.31" (uid=993 pid=5925 comm="/usr/bin/pulseaudio --start --log-target=syslog ") interface="org.bluez.Manager" member="GetProperties" error name="(unset)" requested_reply="0" destination="org.bluez" (uid=0 pid=22735 comm="/usr/sbin/bluetoothd -n ") >Oct 28 21:23:11 unused dbus[668]: [system] Rejected send message, 2 matched rules; type="method_call", sender=":1.31" (uid=993 pid=5925 comm="/usr/bin/pulseaudio --start --log-target=syslog ") interface="org.bluez.Manager" member="GetProperties" error name="(unset)" requested_reply="0" destination="org.bluez" (uid=0 pid=22735 comm="/usr/sbin/bluetoothd -n ") >Oct 28 21:23:11 unused pulseaudio[5925]: [pulseaudio] bluetooth-util.c: org.bluez.Manager.GetProperties() failed: org.freedesktop.DBus.Error.AccessDenied: Rejected send message, 2 matched rules; type="method_call", sender=":1.31" (uid=993 pid=5925 comm="/usr/bin/pulseaudio --start --log-target=syslog ") interface="org.bluez.Manager" member="GetProperties" error name="(unset)" requested_reply="0" destination="org.bluez" (uid=0 pid=22735 comm="/usr/sbin/bluetoothd -n ") >Oct 28 21:23:11 unused bluetoothd[22735]: Starting SDP server >Oct 28 21:23:11 unused bluetoothd: bluetoothd[22735]: Starting SDP server >Oct 28 21:23:11 unused kernel: Bluetooth: Core ver 2.16 >Oct 28 21:23:11 unused kernel: NET: Registered protocol family 31 >Oct 28 21:23:11 unused kernel: Bluetooth: HCI device and connection manager initialized >Oct 28 21:23:11 unused kernel: Bluetooth: HCI socket layer initialized >Oct 28 21:23:11 unused kernel: Bluetooth: L2CAP socket layer initialized >Oct 28 21:23:11 unused kernel: Bluetooth: SCO socket layer initialized >Oct 28 21:23:11 unused kernel: Bluetooth: BNEP (Ethernet Emulation) ver 1.3 >Oct 28 21:23:11 unused kernel: Bluetooth: BNEP filters: protocol multicast >Oct 28 21:23:11 unused kernel: Bluetooth: BNEP socket layer initialized >Oct 28 21:23:11 unused bluetoothd: bluetoothd[22735]: Parsing /etc/bluetooth/input.conf failed: No such file or directory >Oct 28 21:23:11 unused bluetoothd[22735]: Parsing /etc/bluetooth/input.conf failed: No such file or directory >Oct 28 21:23:11 unused bluetoothd: bluetoothd[22735]: Bluetooth Management interface initialized >Oct 28 21:23:11 unused bluetoothd[22735]: Bluetooth Management interface initialized >Oct 28 21:23:11 unused NetworkManager[899]: <info> use BlueZ version 4 >Oct 28 21:23:11 unused rtkit-daemon[665]: Successfully made thread 22746 of process 22746 (/usr/bin/pulseaudio) owned by '1000' high priority at nice level -11. >Oct 28 21:23:11 unused pulseaudio[22746]: [pulseaudio] pid.c: Daemon already running. >Oct 28 21:23:11 unused gnome-session: (gnome-settings-daemon:22622): color-plugin-WARNING **: failed to get edid: unable to get EDID for output >Oct 28 21:23:11 unused colord: Device added: xrandr-Virtual-0 >Oct 28 21:23:11 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::primary after class was initialised >Oct 28 21:23:11 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::index after class was initialised >Oct 28 21:23:11 unused gnome-session: (gnome-settings-daemon:22622): color-plugin-WARNING **: unable to get EDID for xrandr-Virtual-0: unable to get EDID for output >Oct 28 21:23:12 unused gnome-session: JS LOG: GNOME Shell started at Tue Oct 28 2014 21:23:12 GMT+0800 (CST) >Oct 28 21:23:13 unused gnome-session: Failed to play sound: File or data not found >Oct 28 21:23:13 unused gnome-session: Entering running state >Oct 28 21:23:13 unused gnome-session: Creating config directory:'/home/licong/.config/tracker' >Oct 28 21:23:13 unused gnome-session: Tracker-Message: Importing config file to GSettings >Oct 28 21:23:13 unused gnome-session: Tracker-Message: Importing config file to GSettings >Oct 28 21:23:13 unused gnome-session: Tracker-Message: Importing config file to GSettings >Oct 28 21:23:13 unused gnome-session: Initializing nautilus-open-terminal extension >Oct 28 21:23:14 unused gnome-session: (tracker-miner-fs:22886): GLib-CRITICAL **: g_timer_continue: assertion 'timer->active == FALSE' failed >Oct 28 21:23:14 unused gnome-session: (tracker-miner-fs:22886): Tracker-WARNING **: File 'file:///usr' has been reenqueued more than 2 times. It will not be indexed. >Oct 28 21:23:14 unused gnome-session: (tracker-miner-fs:22886): Tracker-WARNING **: File 'file:///usr/share' has been reenqueued more than 2 times. It will not be indexed. >Oct 28 21:23:14 unused gnome-session: (tracker-miner-fs:22886): Tracker-WARNING **: File 'file:///usr/share/gnome-documents' has been reenqueued more than 2 times. It will not be indexed. >Oct 28 21:23:14 unused gnome-session: (tracker-miner-fs:22886): Tracker-WARNING **: File 'file:///usr/share/gnome-documents/getting-started' has been reenqueued more than 2 times. It will not be indexed. >Oct 28 21:23:14 unused gnome-session: (tracker-miner-fs:22886): Tracker-WARNING **: File 'file:///usr/share/gnome-documents/getting-started/C' has been reenqueued more than 2 times. It will not be indexed. >Oct 28 21:23:14 unused gnome-session: (tracker-miner-fs:22886): Tracker-WARNING **: File 'file:///usr/share/gnome-documents/getting-started/C/gnome-documents-getting-started.pdf' has been reenqueued more than 2 times. It will not be indexed. >Oct 28 21:23:14 unused dbus-daemon: dbus[668]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' >Oct 28 21:23:14 unused dbus[668]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' >Oct 28 21:23:14 unused systemd: Starting Hostname Service... >Oct 28 21:23:14 unused dbus-daemon: dbus[668]: [system] Successfully activated service 'org.freedesktop.hostname1' >Oct 28 21:23:14 unused dbus[668]: [system] Successfully activated service 'org.freedesktop.hostname1' >Oct 28 21:23:14 unused systemd: Started Hostname Service. >Oct 28 21:23:23 unused kernel: TCP: lp registered >Oct 28 21:23:47 unused gnome-session: (nautilus:22849): GLib-GObject-WARNING **: gsignal.c:2580: instance '0x16c8ee0' has no handler with id '315' >Oct 28 21:23:47 unused systemd-logind: System is powering down. >Oct 28 21:23:47 unused gnome-session: Window manager warning: last_focus_time (2648905) is greater than comparison timestamp (2648903). This most likely represents a buggy client sending inaccurate timestamps in messages such as _NET_ACTIVE_WINDOW. Trying to work around... >Oct 28 21:23:47 unused gnome-session: (gnome-settings-daemon:22622): wacom-plugin-CRITICAL **: gsd_wacom_device_get_device_type: assertion 'GSD_IS_WACOM_DEVICE (device)' failed >Oct 28 21:23:47 unused gnome-session: (gnome-settings-daemon:22622): wacom-plugin-CRITICAL **: gsd_wacom_device_get_device_type: assertion 'GSD_IS_WACOM_DEVICE (device)' failed >Oct 28 21:23:47 unused gnome-session: (gnome-settings-daemon:22622): wacom-plugin-CRITICAL **: gsd_wacom_device_get_device_type: assertion 'GSD_IS_WACOM_DEVICE (device)' failed >Oct 28 21:23:47 unused gnome-session: (gnome-settings-daemon:22622): wacom-plugin-CRITICAL **: gsd_wacom_device_get_device_type: assertion 'GSD_IS_WACOM_DEVICE (device)' failed >Oct 28 21:23:47 unused gnome-session: (gnome-settings-daemon:22622): wacom-plugin-CRITICAL **: gsd_wacom_device_get_device_type: assertion 'GSD_IS_WACOM_DEVICE (device)' failed >Oct 28 21:23:47 unused gnome-session: (gnome-settings-daemon:22622): wacom-plugin-CRITICAL **: gsd_wacom_device_get_device_type: assertion 'GSD_IS_WACOM_DEVICE (device)' failed >Oct 28 21:23:47 unused systemd: Stopping Session 6 of user licong. >Oct 28 21:23:47 unused systemd: Stopping Session 3 of user root. >Oct 28 21:23:47 unused systemd: Stopping Session c1 of user gnome-initial-setup. >Oct 28 21:23:47 unused systemd: Stopping LVM2 PV scan on device 8:2... >Oct 28 21:23:47 unused systemd: Stopping system-getty.slice. >Oct 28 21:23:47 unused systemd: Removed slice system-getty.slice. >Oct 28 21:23:47 unused systemd: Stopping Dump dmesg to /var/log/dmesg... >Oct 28 21:23:47 unused systemd: Stopped Dump dmesg to /var/log/dmesg. >Oct 28 21:23:47 unused systemd: Stopping Graphical Interface. >Oct 28 21:23:47 unused systemd: Stopped target Graphical Interface. >Oct 28 21:23:47 unused systemd: Stopping Multi-User System. >Oct 28 21:23:47 unused gnome-session: Received signal:15->'Terminated' >Oct 28 21:23:47 unused gnome-session: Received signal:15->'Terminated' >Oct 28 21:23:47 unused rsyslogd: [origin software="rsyslogd" swVersion="7.4.7" x-pid="649" x-info="http://www.rsyslog.com"] exiting on signal 15. >Oct 29 10:59:20 unused rsyslogd: [origin software="rsyslogd" swVersion="7.4.7" x-pid="651" x-info="http://www.rsyslog.com"] start >Oct 29 10:58:53 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 10:58:53 unused kernel: Initializing cgroup subsys cpuset >Oct 29 10:58:53 unused kernel: Initializing cgroup subsys cpu >Oct 29 10:58:53 unused kernel: Initializing cgroup subsys cpuacct >Oct 29 10:58:53 unused kernel: Linux version 3.10.0-175.el7.x86_64 (mockbuild@x86-018.build.eng.bos.redhat.com) (gcc version 4.8.3 20140911 (Red Hat 4.8.3-7) (GCC) ) #1 SMP Tue Sep 30 02:14:47 EDT 2014 >Oct 29 10:58:53 unused kernel: Command line: BOOT_IMAGE=/vmlinuz-3.10.0-175.el7.x86_64 root=/dev/mapper/rhel_unused-root ro crashkernel=auto rd.lvm.lv=rhel_unused/root rd.lvm.lv=rhel_unused/swap console=tty0 console=ttyS0,115200 LANG=en_US.UTF-8 >Oct 29 10:58:53 unused kernel: e820: BIOS-provided physical RAM map: >Oct 29 10:58:53 unused kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable >Oct 29 10:58:53 unused kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved >Oct 29 10:58:53 unused kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved >Oct 29 10:58:53 unused kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdffff] usable >Oct 29 10:58:53 unused kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved >Oct 29 10:58:53 unused kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved >Oct 29 10:58:53 unused kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved >Oct 29 10:58:53 unused kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable >Oct 29 10:58:53 unused kernel: NX (Execute Disable) protection: active >Oct 29 10:58:53 unused kernel: SMBIOS 2.8 present. >Oct 29 10:58:53 unused kernel: Hypervisor detected: KVM >Oct 29 10:58:53 unused kernel: No AGP bridge found >Oct 29 10:58:53 unused kernel: e820: last_pfn = 0x140000 max_arch_pfn = 0x400000000 >Oct 29 10:58:53 unused kernel: x86 PAT enabled: cpu 0, old 0x7040600070406, new 0x7010600070106 >Oct 29 10:58:53 unused kernel: e820: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 >Oct 29 10:58:53 unused kernel: found SMP MP-table at [mem 0x000f2030-0x000f203f] mapped at [ffff8800000f2030] >Oct 29 10:58:53 unused kernel: init_memory_mapping: [mem 0x00000000-0x000fffff] >Oct 29 10:58:53 unused kernel: init_memory_mapping: [mem 0x13fe00000-0x13fffffff] >Oct 29 10:58:53 unused kernel: init_memory_mapping: [mem 0x13c000000-0x13fdfffff] >Oct 29 10:58:53 unused kernel: init_memory_mapping: [mem 0x100000000-0x13bffffff] >Oct 29 10:58:53 unused kernel: init_memory_mapping: [mem 0x00100000-0xbffdffff] >Oct 29 10:58:53 unused kernel: RAMDISK: [mem 0x35c37000-0x36e13fff] >Oct 29 10:58:53 unused kernel: Reserving 161MB of memory at 688MB for crashkernel (System RAM: 4095MB) >Oct 29 10:58:53 unused kernel: ACPI: RSDP 00000000000f1d90 00014 (v00 BOCHS ) >Oct 29 10:58:53 unused kernel: ACPI: RSDT 00000000bffe1931 00030 (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001) >Oct 29 10:58:53 unused kernel: ACPI: FACP 00000000bffe0b37 00074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001) >Oct 29 10:58:53 unused kernel: ACPI: DSDT 00000000bffe0040 00AF7 (v01 BOCHS BXPCDSDT 00000001 BXPC 00000001) >Oct 29 10:58:53 unused kernel: ACPI: FACS 00000000bffe0000 00040 >Oct 29 10:58:53 unused kernel: ACPI: SSDT 00000000bffe0bab 00CF6 (v01 BOCHS BXPCSSDT 00000001 BXPC 00000001) >Oct 29 10:58:53 unused kernel: ACPI: APIC 00000000bffe18a1 00090 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001) >Oct 29 10:58:53 unused kernel: No NUMA configuration found >Oct 29 10:58:53 unused kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] >Oct 29 10:58:53 unused kernel: Initmem setup node 0 [mem 0x00000000-0x13fffffff] >Oct 29 10:58:53 unused kernel: NODE_DATA [mem 0x13ffd6000-0x13fffcfff] >Oct 29 10:58:53 unused kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 >Oct 29 10:58:53 unused kernel: kvm-clock: cpu 0, msr 1:3ff86001, primary cpu clock >Oct 29 10:58:53 unused kernel: Zone ranges: >Oct 29 10:58:53 unused kernel: DMA [mem 0x00001000-0x00ffffff] >Oct 29 10:58:53 unused kernel: DMA32 [mem 0x01000000-0xffffffff] >Oct 29 10:58:53 unused kernel: Normal [mem 0x100000000-0x13fffffff] >Oct 29 10:58:53 unused kernel: Movable zone start for each node >Oct 29 10:58:53 unused kernel: Early memory node ranges >Oct 29 10:58:53 unused kernel: node 0: [mem 0x00001000-0x0009efff] >Oct 29 10:58:53 unused kernel: node 0: [mem 0x00100000-0xbffdffff] >Oct 29 10:58:53 unused kernel: node 0: [mem 0x100000000-0x13fffffff] >Oct 29 10:58:53 unused kernel: ACPI: PM-Timer IO Port: 0x608 >Oct 29 10:58:53 unused kernel: ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled) >Oct 29 10:58:53 unused kernel: ACPI: LAPIC (acpi_id[0x01] lapic_id[0x01] enabled) >Oct 29 10:58:53 unused kernel: ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled) >Oct 29 10:58:53 unused kernel: ACPI: LAPIC (acpi_id[0x03] lapic_id[0x03] enabled) >Oct 29 10:58:53 unused kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) >Oct 29 10:58:53 unused kernel: ACPI: IOAPIC (id[0x00] address[0xfec00000] gsi_base[0]) >Oct 29 10:58:53 unused kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 >Oct 29 10:58:53 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) >Oct 29 10:58:53 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) >Oct 29 10:58:53 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) >Oct 29 10:58:53 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) >Oct 29 10:58:53 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) >Oct 29 10:58:53 unused kernel: Using ACPI (MADT) for SMP configuration information >Oct 29 10:58:53 unused kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs >Oct 29 10:58:53 unused kernel: PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff] >Oct 29 10:58:53 unused kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000effff] >Oct 29 10:58:53 unused kernel: PM: Registered nosave memory: [mem 0x000f0000-0x000fffff] >Oct 29 10:58:53 unused kernel: PM: Registered nosave memory: [mem 0xbffe0000-0xbfffffff] >Oct 29 10:58:53 unused kernel: PM: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] >Oct 29 10:58:53 unused kernel: PM: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] >Oct 29 10:58:53 unused kernel: PM: Registered nosave memory: [mem 0xff000000-0xfffbffff] >Oct 29 10:58:53 unused kernel: PM: Registered nosave memory: [mem 0xfffc0000-0xffffffff] >Oct 29 10:58:53 unused kernel: e820: [mem 0xc0000000-0xfeffbfff] available for PCI devices >Oct 29 10:58:53 unused kernel: Booting paravirtualized kernel on KVM >Oct 29 10:58:53 unused kernel: setup_percpu: NR_CPUS:5120 nr_cpumask_bits:4 nr_cpu_ids:4 nr_node_ids:1 >Oct 29 10:58:53 unused kernel: PERCPU: Embedded 29 pages/cpu @ffff88013fc00000 s86656 r8192 d23936 u524288 >Oct 29 10:58:53 unused kernel: KVM setup async PF for cpu 0 >Oct 29 10:58:53 unused kernel: kvm-stealtime: cpu 0, msr 13fc0e000 >Oct 29 10:58:53 unused kernel: Built 1 zonelists in Node order, mobility grouping on. Total pages: 1032041 >Oct 29 10:58:53 unused kernel: Policy zone: Normal >Oct 29 10:58:53 unused kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-3.10.0-175.el7.x86_64 root=/dev/mapper/rhel_unused-root ro crashkernel=auto rd.lvm.lv=rhel_unused/root rd.lvm.lv=rhel_unused/swap console=tty0 console=ttyS0,115200 LANG=en_US.UTF-8 >Oct 29 10:58:53 unused kernel: PID hash table entries: 4096 (order: 3, 32768 bytes) >Oct 29 10:58:53 unused kernel: xsave: enabled xstate_bv 0x7, cntxt size 0x340 >Oct 29 10:58:53 unused kernel: Checking aperture... >Oct 29 10:58:53 unused kernel: No AGP bridge found >Oct 29 10:58:53 unused kernel: Memory: 3863044k/5242880k available (6216k kernel code, 1049096k absent, 330740k reserved, 4153k data, 1604k init) >Oct 29 10:58:53 unused kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 >Oct 29 10:58:53 unused kernel: Hierarchical RCU implementation. >Oct 29 10:58:53 unused kernel: RCU restricting CPUs from NR_CPUS=5120 to nr_cpu_ids=4. >Oct 29 10:58:53 unused kernel: Experimental no-CBs for all CPUs >Oct 29 10:58:53 unused kernel: Experimental no-CBs CPUs: 0-3. >Oct 29 10:58:53 unused kernel: NR_IRQS:327936 nr_irqs:712 16 >Oct 29 10:58:53 unused kernel: Console: colour VGA+ 80x25 >Oct 29 10:58:53 unused kernel: console [tty0] enabled >Oct 29 10:58:53 unused kernel: console [ttyS0] enabled >Oct 29 10:58:53 unused kernel: allocated 16777216 bytes of page_cgroup >Oct 29 10:58:53 unused kernel: please try 'cgroup_disable=memory' option if you don't want memory cgroups >Oct 29 10:58:53 unused kernel: tsc: Detected 1999.999 MHz processor >Oct 29 10:58:53 unused kernel: Calibrating delay loop (skipped) preset value.. 3999.99 BogoMIPS (lpj=1999999) >Oct 29 10:58:53 unused kernel: pid_max: default: 32768 minimum: 301 >Oct 29 10:58:53 unused kernel: Security Framework initialized >Oct 29 10:58:53 unused kernel: SELinux: Initializing. >Oct 29 10:58:53 unused kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes) >Oct 29 10:58:53 unused kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes) >Oct 29 10:58:53 unused kernel: Mount-cache hash table entries: 4096 >Oct 29 10:58:53 unused kernel: Initializing cgroup subsys memory >Oct 29 10:58:53 unused kernel: Initializing cgroup subsys devices >Oct 29 10:58:53 unused kernel: Initializing cgroup subsys freezer >Oct 29 10:58:53 unused kernel: Initializing cgroup subsys net_cls >Oct 29 10:58:53 unused kernel: Initializing cgroup subsys blkio >Oct 29 10:58:53 unused kernel: Initializing cgroup subsys perf_event >Oct 29 10:58:53 unused kernel: Initializing cgroup subsys hugetlb >Oct 29 10:58:53 unused kernel: CPU: Physical Processor ID: 0 >Oct 29 10:58:53 unused kernel: CPU: Processor Core ID: 0 >Oct 29 10:58:53 unused kernel: mce: CPU supports 10 MCE banks >Oct 29 10:58:53 unused kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 >Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0 >tlb_flushall_shift: 6 >Oct 29 10:58:53 unused kernel: Freeing SMP alternatives: 24k freed >Oct 29 10:58:53 unused kernel: ACPI: Core revision 20130517 >Oct 29 10:58:53 unused kernel: ACPI: All ACPI Tables successfully acquired >Oct 29 10:58:53 unused kernel: ftrace: allocating 23854 entries in 94 pages >Oct 29 10:58:53 unused kernel: Enabling x2apic >Oct 29 10:58:53 unused kernel: Enabled x2apic >Oct 29 10:58:53 unused kernel: Switched APIC routing to physical x2apic. >Oct 29 10:58:53 unused kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 >Oct 29 10:58:53 unused kernel: smpboot: CPU0: Intel Xeon E312xx (Sandy Bridge) (fam: 06, model: 2a, stepping: 01) >Oct 29 10:58:53 unused kernel: Performance Events: unsupported p6 CPU model 42 no PMU driver, software events only. >Oct 29 10:58:53 unused kernel: KVM setup paravirtual spinlock >Oct 29 10:58:53 unused kernel: NMI watchdog: disabled (cpu0): hardware events not enabled >Oct 29 10:58:53 unused kernel: kvm-clock: cpu 1, msr 1:3ff86041, secondary cpu clock >Oct 29 10:58:53 unused kernel: KVM setup async PF for cpu 1 >Oct 29 10:58:53 unused kernel: kvm-stealtime: cpu 1, msr 13fc8e000 >Oct 29 10:58:53 unused kernel: kvm-clock: cpu 2, msr 1:3ff86081, secondary cpu clock >Oct 29 10:58:53 unused kernel: KVM setup async PF for cpu 2 >Oct 29 10:58:53 unused kernel: smpboot: Booting Node 0, Processors #1 #2 #3 OK >Oct 29 10:58:53 unused kernel: kvm-stealtime: cpu 2, msr 13fd0e000 >Oct 29 10:58:53 unused kernel: kvm-clock: cpu 3, msr 1:3ff860c1, secondary cpu clock >Oct 29 10:58:53 unused kernel: Brought up 4 CPUs >Oct 29 10:58:53 unused kernel: KVM setup async PF for cpu 3 >Oct 29 10:58:53 unused kernel: kvm-stealtime: cpu 3, msr 13fd8e000 >Oct 29 10:58:53 unused kernel: smpboot: Total of 4 processors activated (15999.99 BogoMIPS) >Oct 29 10:58:53 unused kernel: devtmpfs: initialized >Oct 29 10:58:53 unused kernel: EVM: security.selinux >Oct 29 10:58:53 unused kernel: EVM: security.ima >Oct 29 10:58:53 unused kernel: EVM: security.capability >Oct 29 10:58:53 unused kernel: atomic64 test passed for x86-64 platform with CX8 and with SSE >Oct 29 10:58:53 unused kernel: NET: Registered protocol family 16 >Oct 29 10:58:53 unused kernel: ACPI: bus type PCI registered >Oct 29 10:58:53 unused kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 >Oct 29 10:58:53 unused kernel: PCI: Using configuration type 1 for base access >Oct 29 10:58:53 unused kernel: ACPI: Added _OSI(Module Device) >Oct 29 10:58:53 unused kernel: ACPI: Added _OSI(Processor Device) >Oct 29 10:58:53 unused kernel: ACPI: Added _OSI(3.0 _SCP Extensions) >Oct 29 10:58:53 unused kernel: ACPI: Added _OSI(Processor Aggregator Device) >Oct 29 10:58:53 unused kernel: ACPI: Interpreter enabled >Oct 29 10:58:53 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S1_] (20130517/hwxface-571) >Oct 29 10:58:53 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S2_] (20130517/hwxface-571) >Oct 29 10:58:53 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S3_] (20130517/hwxface-571) >Oct 29 10:58:53 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S4_] (20130517/hwxface-571) >Oct 29 10:58:53 unused kernel: ACPI: (supports S0 S5) >Oct 29 10:58:53 unused kernel: ACPI: Using IOAPIC for interrupt routing >Oct 29 10:58:53 unused kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug >Oct 29 10:58:53 unused kernel: ACPI: No dock devices found. >Oct 29 10:58:53 unused kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) >Oct 29 10:58:53 unused kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI] >Oct 29 10:58:53 unused kernel: acpi PNP0A03:00: _OSC failed (AE_NOT_FOUND); disabling ASPM >Oct 29 10:58:53 unused kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. >Oct 29 10:58:53 unused kernel: acpiphp: Slot [4] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [5] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [6] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [7] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [8] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [9] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [10] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [11] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [12] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [13] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [14] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [15] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [16] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [17] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [18] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [19] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [20] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [21] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [22] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [23] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [24] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [25] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [26] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [27] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [28] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [29] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [30] registered >Oct 29 10:58:53 unused kernel: acpiphp: Slot [31] registered >Oct 29 10:58:53 unused kernel: PCI host bridge to bus 0000:00 >Oct 29 10:58:53 unused kernel: pci_bus 0000:00: root bus resource [bus 00-ff] >Oct 29 10:58:53 unused kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7] >Oct 29 10:58:53 unused kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xadff] >Oct 29 10:58:53 unused kernel: pci_bus 0000:00: root bus resource [io 0xae0f-0xaeff] >Oct 29 10:58:53 unused kernel: pci_bus 0000:00: root bus resource [io 0xaf20-0xafdf] >Oct 29 10:58:53 unused kernel: pci_bus 0000:00: root bus resource [io 0xafe4-0xffff] >Oct 29 10:58:53 unused kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff] >Oct 29 10:58:53 unused kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff] >Oct 29 10:58:53 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] >Oct 29 10:58:53 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] >Oct 29 10:58:53 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] >Oct 29 10:58:53 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] >Oct 29 10:58:53 unused kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI >Oct 29 10:58:53 unused kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB >Oct 29 10:58:53 unused kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) >Oct 29 10:58:53 unused kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) >Oct 29 10:58:53 unused kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) >Oct 29 10:58:53 unused kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) >Oct 29 10:58:53 unused kernel: ACPI: PCI Interrupt Link [LNKS] (IRQs *9) >Oct 29 10:58:53 unused kernel: ACPI: Enabled 16 GPEs in block 00 to 0F >Oct 29 10:58:53 unused kernel: vgaarb: device added: PCI:0000:00:02.0,decodes=io+mem,owns=io+mem,locks=none >Oct 29 10:58:53 unused kernel: vgaarb: loaded >Oct 29 10:58:53 unused kernel: vgaarb: bridge control possible 0000:00:02.0 >Oct 29 10:58:53 unused kernel: SCSI subsystem initialized >Oct 29 10:58:53 unused kernel: ACPI: bus type USB registered >Oct 29 10:58:53 unused kernel: usbcore: registered new interface driver usbfs >Oct 29 10:58:53 unused kernel: usbcore: registered new interface driver hub >Oct 29 10:58:53 unused kernel: usbcore: registered new device driver usb >Oct 29 10:58:53 unused kernel: PCI: Using ACPI for IRQ routing >Oct 29 10:58:53 unused kernel: NetLabel: Initializing >Oct 29 10:58:53 unused kernel: NetLabel: domain hash size = 128 >Oct 29 10:58:53 unused kernel: NetLabel: protocols = UNLABELED CIPSOv4 >Oct 29 10:58:53 unused kernel: NetLabel: unlabeled traffic allowed by default >Oct 29 10:58:53 unused kernel: Switching to clocksource kvm-clock >Oct 29 10:58:53 unused kernel: pnp: PnP ACPI init >Oct 29 10:58:53 unused kernel: ACPI: bus type PNP registered >Oct 29 10:58:53 unused kernel: pnp: PnP ACPI: found 6 devices >Oct 29 10:58:53 unused kernel: ACPI: bus type PNP unregistered >Oct 29 10:58:53 unused kernel: NET: Registered protocol family 2 >Oct 29 10:58:53 unused kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes) >Oct 29 10:58:53 unused kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes) >Oct 29 10:58:53 unused kernel: TCP: Hash tables configured (established 32768 bind 32768) >Oct 29 10:58:53 unused kernel: TCP: reno registered >Oct 29 10:58:53 unused kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes) >Oct 29 10:58:53 unused kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes) >Oct 29 10:58:53 unused kernel: NET: Registered protocol family 1 >Oct 29 10:58:53 unused kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers >Oct 29 10:58:53 unused kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release >Oct 29 10:58:53 unused kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds >Oct 29 10:58:53 unused kernel: ACPI: PCI Interrupt Link [LNKC] enabled at IRQ 11 >Oct 29 10:58:53 unused kernel: Unpacking initramfs... >Oct 29 10:58:53 unused kernel: Freeing initrd memory: 18292k freed >Oct 29 10:58:53 unused kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) >Oct 29 10:58:53 unused kernel: software IO TLB [mem 0xbbfe0000-0xbffe0000] (64MB) mapped at [ffff8800bbfe0000-ffff8800bffdffff] >Oct 29 10:58:53 unused kernel: RAPL PMU detected, hw unit 2^-12 Joules, API unit is 2^-32 Joules, 3 fixed counters 2621440 ms ovfl timer >Oct 29 10:58:53 unused kernel: microcode: CPU0 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 10:58:53 unused kernel: microcode: CPU1 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 10:58:53 unused kernel: microcode: CPU2 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 10:58:53 unused kernel: microcode: CPU3 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 10:58:53 unused kernel: microcode: Microcode Update Driver: v2.00 <tigran@aivazian.fsnet.co.uk>, Peter Oruba >Oct 29 10:58:53 unused kernel: futex hash table entries: 1024 (order: 4, 65536 bytes) >Oct 29 10:58:53 unused kernel: Initialise system trusted keyring >Oct 29 10:58:53 unused kernel: audit: initializing netlink socket (disabled) >Oct 29 10:58:53 unused kernel: type=2000 audit(1414551533.648:1): initialized >Oct 29 10:58:53 unused kernel: HugeTLB registered 2 MB page size, pre-allocated 0 pages >Oct 29 10:58:53 unused kernel: zbud: loaded >Oct 29 10:58:53 unused kernel: VFS: Disk quotas dquot_6.5.2 >Oct 29 10:58:53 unused kernel: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) >Oct 29 10:58:53 unused kernel: msgmni has been set to 7580 >Oct 29 10:58:53 unused kernel: Key type big_key registered >Oct 29 10:58:53 unused kernel: alg: No test for stdrng (krng) >Oct 29 10:58:53 unused kernel: NET: Registered protocol family 38 >Oct 29 10:58:53 unused kernel: Key type asymmetric registered >Oct 29 10:58:53 unused kernel: Asymmetric key parser 'x509' registered >Oct 29 10:58:53 unused kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 252) >Oct 29 10:58:53 unused kernel: io scheduler noop registered >Oct 29 10:58:53 unused kernel: io scheduler deadline registered (default) >Oct 29 10:58:53 unused kernel: io scheduler cfq registered >Oct 29 10:58:53 unused kernel: pci_hotplug: PCI Hot Plug PCI Core version: 0.5 >Oct 29 10:58:53 unused kernel: pciehp: PCI Express Hot Plug Controller Driver version: 0.4 >Oct 29 10:58:53 unused kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 >Oct 29 10:58:53 unused kernel: ACPI: Power Button [PWRF] >Oct 29 10:58:53 unused kernel: GHES: HEST is not enabled! >Oct 29 10:58:53 unused kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled >Oct 29 10:58:53 unused kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A >Oct 29 10:58:53 unused kernel: Non-volatile memory driver v1.3 >Oct 29 10:58:53 unused kernel: Linux agpgart interface v0.103 >Oct 29 10:58:53 unused kernel: crash memory driver: version 1.1 >Oct 29 10:58:53 unused kernel: rdac: device handler registered >Oct 29 10:58:53 unused kernel: hp_sw: device handler registered >Oct 29 10:58:53 unused kernel: emc: device handler registered >Oct 29 10:58:53 unused kernel: alua: device handler registered >Oct 29 10:58:53 unused kernel: libphy: Fixed MDIO Bus: probed >Oct 29 10:58:53 unused kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver >Oct 29 10:58:53 unused kernel: ehci-pci: EHCI PCI platform driver >Oct 29 10:58:53 unused kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver >Oct 29 10:58:53 unused kernel: ohci-pci: OHCI PCI platform driver >Oct 29 10:58:53 unused kernel: uhci_hcd: USB Universal Host Controller Interface driver >Oct 29 10:58:53 unused kernel: uhci_hcd 0000:00:03.0: UHCI Host Controller >Oct 29 10:58:53 unused kernel: uhci_hcd 0000:00:03.0: new USB bus registered, assigned bus number 1 >Oct 29 10:58:53 unused kernel: uhci_hcd 0000:00:03.0: detected 2 ports >Oct 29 10:58:53 unused kernel: uhci_hcd 0000:00:03.0: irq 11, io base 0x0000c0a0 >Oct 29 10:58:53 unused kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001 >Oct 29 10:58:53 unused kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Oct 29 10:58:53 unused kernel: usb usb1: Product: UHCI Host Controller >Oct 29 10:58:53 unused kernel: usb usb1: Manufacturer: Linux 3.10.0-175.el7.x86_64 uhci_hcd >Oct 29 10:58:53 unused kernel: usb usb1: SerialNumber: 0000:00:03.0 >Oct 29 10:58:53 unused kernel: hub 1-0:1.0: USB hub found >Oct 29 10:58:53 unused kernel: hub 1-0:1.0: 2 ports detected >Oct 29 10:58:53 unused kernel: usbcore: registered new interface driver usbserial >Oct 29 10:58:53 unused kernel: usbcore: registered new interface driver usbserial_generic >Oct 29 10:58:53 unused kernel: usbserial: USB Serial support registered for generic >Oct 29 10:58:53 unused kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 >Oct 29 10:58:53 unused kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 >Oct 29 10:58:53 unused kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 >Oct 29 10:58:53 unused kernel: mousedev: PS/2 mouse device common for all mice >Oct 29 10:58:53 unused kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 >Oct 29 10:58:53 unused kernel: rtc_cmos 00:00: RTC can wake from S4 >Oct 29 10:58:53 unused kernel: rtc_cmos 00:00: rtc core: registered rtc_cmos as rtc0 >Oct 29 10:58:53 unused kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram >Oct 29 10:58:53 unused kernel: cpuidle: using governor menu >Oct 29 10:58:53 unused kernel: hidraw: raw HID events driver (C) Jiri Kosina >Oct 29 10:58:53 unused kernel: usbcore: registered new interface driver usbhid >Oct 29 10:58:53 unused kernel: usbhid: USB HID core driver >Oct 29 10:58:53 unused kernel: drop_monitor: Initializing network drop monitor service >Oct 29 10:58:53 unused kernel: TCP: cubic registered >Oct 29 10:58:53 unused kernel: Initializing XFRM netlink socket >Oct 29 10:58:53 unused kernel: NET: Registered protocol family 10 >Oct 29 10:58:53 unused kernel: NET: Registered protocol family 17 >Oct 29 10:58:53 unused kernel: Loading compiled-in X.509 certificates >Oct 29 10:58:53 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' >Oct 29 10:58:53 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' >Oct 29 10:58:53 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: 4304258329ea0da1b80ad429df72c33fe68bdcec' >Oct 29 10:58:53 unused kernel: registered taskstats version 1 >Oct 29 10:58:53 unused kernel: Key type trusted registered >Oct 29 10:58:53 unused kernel: Key type encrypted registered >Oct 29 10:58:53 unused kernel: IMA: No TPM chip found, activating TPM-bypass! >Oct 29 10:58:53 unused kernel: rtc_cmos 00:00: setting system clock to 2014-10-29 02:58:53 UTC (1414551533) >Oct 29 10:58:53 unused kernel: Freeing unused kernel memory: 1604k freed >Oct 29 10:58:53 unused systemd[1]: systemd 208 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ) >Oct 29 10:58:53 unused systemd[1]: Detected virtualization 'kvm'. >Oct 29 10:58:53 unused systemd[1]: Running in initial RAM disk. >Oct 29 10:58:53 unused systemd[1]: Set hostname to <unused>. >Oct 29 10:58:53 unused systemd[1]: Expecting device dev-mapper-rhel_unused\x2droot.device... >Oct 29 10:58:53 unused systemd[1]: Starting -.slice. >Oct 29 10:58:53 unused systemd[1]: Created slice -.slice. >Oct 29 10:58:53 unused systemd[1]: Starting System Slice. >Oct 29 10:58:53 unused systemd[1]: Created slice System Slice. >Oct 29 10:58:53 unused systemd[1]: Starting Slices. >Oct 29 10:58:53 unused systemd[1]: Reached target Slices. >Oct 29 10:58:53 unused systemd[1]: Starting Timers. >Oct 29 10:58:53 unused systemd[1]: Reached target Timers. >Oct 29 10:58:53 unused systemd[1]: Starting Journal Socket. >Oct 29 10:58:53 unused systemd[1]: Listening on Journal Socket. >Oct 29 10:58:53 unused systemd[1]: Started dracut ask for additional cmdline parameters. >Oct 29 10:58:53 unused systemd[1]: Starting dracut cmdline hook... >Oct 29 10:58:53 unused systemd[1]: Started Load Kernel Modules. >Oct 29 10:58:53 unused systemd[1]: Starting Setup Virtual Console... >Oct 29 10:58:53 unused systemd[1]: Starting Journal Service... >Oct 29 10:58:53 unused systemd[1]: Started Journal Service. >Oct 29 10:58:53 unused journal: Journal started >Oct 29 10:58:53 unused systemd: Starting udev Kernel Socket. >Oct 29 10:58:53 unused systemd: Listening on udev Kernel Socket. >Oct 29 10:58:53 unused systemd: Starting udev Control Socket. >Oct 29 10:58:53 unused systemd: Listening on udev Control Socket. >Oct 29 10:58:53 unused systemd: Starting Sockets. >Oct 29 10:58:53 unused systemd: Reached target Sockets. >Oct 29 10:58:53 unused systemd: Starting Create list of required static device nodes for the current kernel... >Oct 29 10:58:53 unused systemd: Starting Apply Kernel Variables... >Oct 29 10:58:53 unused systemd: Starting Swap. >Oct 29 10:58:53 unused systemd: Reached target Swap. >Oct 29 10:58:53 unused systemd: Starting Local File Systems. >Oct 29 10:58:53 unused systemd: Reached target Local File Systems. >Oct 29 10:58:53 unused systemd: Started Apply Kernel Variables. >Oct 29 10:58:53 unused systemd: Started Create list of required static device nodes for the current kernel. >Oct 29 10:58:53 unused systemd: Starting Create static device nodes in /dev... >Oct 29 10:58:53 unused dracut-cmdline: dracut-7.1 (Maipo) dracut-033-224.el7 >Oct 29 10:58:53 unused dracut-cmdline: Using kernel command line parameters: >Oct 29 10:58:53 unused systemd: Started Create static device nodes in /dev. >Oct 29 10:58:53 unused systemd: Started Setup Virtual Console. >Oct 29 10:58:53 unused systemd: Started dracut cmdline hook. >Oct 29 10:58:53 unused systemd: Starting dracut pre-udev hook... >Oct 29 10:58:53 unused kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd >Oct 29 10:58:53 unused kernel: device-mapper: uevent: version 1.0.3 >Oct 29 10:58:53 unused kernel: device-mapper: ioctl: 4.27.0-ioctl (2013-10-30) initialised: dm-devel@redhat.com >Oct 29 10:58:53 unused systemd: Started dracut pre-udev hook. >Oct 29 10:58:53 unused systemd: Starting udev Kernel Device Manager... >Oct 29 10:58:53 unused systemd-udevd[259]: starting version 208 >Oct 29 10:58:53 unused systemd: Started udev Kernel Device Manager. >Oct 29 10:58:53 unused systemd: Started dracut pre-trigger hook. >Oct 29 10:58:53 unused systemd: Starting udev Coldplug all Devices... >Oct 29 10:58:53 unused systemd: Mounting Configuration File System... >Oct 29 10:58:53 unused systemd: Mounted Configuration File System. >Oct 29 10:58:53 unused kernel: e1000: Intel(R) PRO/1000 Network Driver - version 7.3.21-k8-NAPI >Oct 29 10:58:53 unused kernel: e1000: Copyright (c) 1999-2006 Intel Corporation. >Oct 29 10:58:53 unused kernel: ACPI: bus type ATA registered >Oct 29 10:58:53 unused kernel: FDC 0 is a S82078B >Oct 29 10:58:53 unused systemd: Started udev Coldplug all Devices. >Oct 29 10:58:53 unused systemd: Starting dracut initqueue hook... >Oct 29 10:58:53 unused kernel: [drm] Initialized drm 1.1.0 20060810 >Oct 29 10:58:53 unused systemd: Starting System Initialization. >Oct 29 10:58:53 unused systemd: Reached target System Initialization. >Oct 29 10:58:53 unused systemd: Starting Show Plymouth Boot Screen... >Oct 29 10:58:53 unused systemd: Started Show Plymouth Boot Screen. >Oct 29 10:58:53 unused systemd: Started Dispatch Password Requests to Console Directory Watch. >Oct 29 10:58:53 unused systemd: Starting Paths. >Oct 29 10:58:53 unused systemd: Reached target Paths. >Oct 29 10:58:53 unused systemd: Starting Forward Password Requests to Plymouth Directory Watch. >Oct 29 10:58:53 unused systemd: Started Forward Password Requests to Plymouth Directory Watch. >Oct 29 10:58:53 unused systemd: Starting Basic System. >Oct 29 10:58:53 unused systemd: Reached target Basic System. >Oct 29 10:58:53 unused kernel: ACPI: PCI Interrupt Link [LNKA] enabled at IRQ 10 >Oct 29 10:58:53 unused kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001 >Oct 29 10:58:53 unused kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=5 >Oct 29 10:58:53 unused kernel: usb 1-1: Product: QEMU USB Tablet >Oct 29 10:58:53 unused kernel: usb 1-1: Manufacturer: QEMU >Oct 29 10:58:53 unused kernel: usb 1-1: SerialNumber: 42 >Oct 29 10:58:53 unused kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:03.0/usb1/1-1/1-1:1.0/input/input2 >Oct 29 10:58:53 unused kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Pointer [QEMU QEMU USB Tablet] on usb-0000:00:03.0-1/input0 >Oct 29 10:58:54 unused kernel: e1000 0000:00:05.0 eth0: (PCI:33MHz:32-bit) 9a:4e:4f:50:51:52 >Oct 29 10:58:54 unused kernel: e1000 0000:00:05.0 eth0: Intel(R) PRO/1000 Network Connection >Oct 29 10:58:54 unused kernel: ACPI: PCI Interrupt Link [LNKD] enabled at IRQ 11 >Oct 29 10:58:54 unused systemd-udevd[262]: renamed network interface eth0 to ens5 >Oct 29 10:58:54 unused kernel: scsi host0: ata_piix >Oct 29 10:58:54 unused kernel: scsi host1: ata_piix >Oct 29 10:58:54 unused kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 >Oct 29 10:58:54 unused kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 >Oct 29 10:58:54 unused kernel: scsi host2: Virtio SCSI HBA >Oct 29 10:58:54 unused kernel: scsi 2:0:0:0: Direct-Access QEMU QEMU HARDDISK 2.1. PQ: 0 ANSI: 5 >Oct 29 10:58:54 unused kernel: scsi 2:0:1:0: CD-ROM QEMU QEMU CD-ROM 2.1. PQ: 0 ANSI: 5 >Oct 29 10:58:54 unused kernel: ACPI: PCI Interrupt Link [LNKB] enabled at IRQ 10 >Oct 29 10:58:54 unused kernel: [drm] Device Version 0.0 >Oct 29 10:58:54 unused kernel: [drm] Compression level 0 log level 0 >Oct 29 10:58:54 unused kernel: [drm] Currently using mode #0, list at 0x488 >Oct 29 10:58:54 unused kernel: [drm] 12286 io pages at offset 0x1000000 >Oct 29 10:58:54 unused kernel: [drm] 16777216 byte draw area at offset 0x0 >Oct 29 10:58:54 unused kernel: [drm] RAM header offset: 0x3ffe000 >Oct 29 10:58:54 unused kernel: [drm] rom modes offset 0x488 for 128 modes >Oct 29 10:58:54 unused kernel: [TTM] Zone kernel: Available graphics memory: 1941482 kiB >Oct 29 10:58:54 unused kernel: [TTM] Initializing pool allocator >Oct 29 10:58:54 unused kernel: [TTM] Initializing DMA pool allocator >Oct 29 10:58:54 unused kernel: [drm] qxl: 16M of VRAM memory size >Oct 29 10:58:54 unused kernel: [drm] qxl: 63M of IO pages memory ready (VRAM domain) >Oct 29 10:58:54 unused kernel: [drm] qxl: 32M of Surface memory size >Oct 29 10:58:54 unused kernel: tsc: Refined TSC clocksource calibration: 2000.001 MHz >Oct 29 10:58:54 unused kernel: [drm] main mem slot 1 [f8000000,3ffe000] >Oct 29 10:58:54 unused kernel: [drm] surface mem slot 2 [fc000000,2000000] >Oct 29 10:58:54 unused kernel: [drm] fb mappable at 0xF8000000, size 3145728 >Oct 29 10:58:54 unused kernel: [drm] fb: depth 24, pitch 4096, width 1024, height 768 >Oct 29 10:58:54 unused kernel: fbcon: qxldrmfb (fb0) is primary device >Oct 29 10:58:54 unused kernel: Console: switching to colour frame buffer device 128x48 >Oct 29 10:58:54 unused kernel: qxl 0000:00:02.0: fb0: qxldrmfb frame buffer device >Oct 29 10:58:54 unused kernel: qxl 0000:00:02.0: registered panic notifier >Oct 29 10:58:54 unused kernel: [drm] Initialized qxl 0.1.0 20120117 for 0000:00:02.0 on minor 0 >Oct 29 10:58:54 unused kernel: sr 2:0:1:0: [sr0] scsi3-mmc drive: 16x/50x cd/rw xa/form2 cdda tray >Oct 29 10:58:54 unused kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 >Oct 29 10:58:54 unused kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 >Oct 29 10:58:54 unused kernel: sd 2:0:0:0: [sda] 41943040 512-byte logical blocks: (21.4 GB/20.0 GiB) >Oct 29 10:58:54 unused kernel: sd 2:0:0:0: [sda] Write Protect is off >Oct 29 10:58:54 unused kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA >Oct 29 10:58:54 unused kernel: sda: sda1 sda2 >Oct 29 10:58:54 unused kernel: sd 2:0:0:0: [sda] Attached SCSI disk >Oct 29 10:58:54 unused dracut-initqueue: Scanning devices sda2 for LVM logical volumes rhel_unused/root rhel_unused/swap >Oct 29 10:58:54 unused dracut-initqueue: inactive '/dev/rhel_unused/swap' [2.00 GiB] inherit >Oct 29 10:58:54 unused dracut-initqueue: inactive '/dev/rhel_unused/root' [17.47 GiB] inherit >Oct 29 10:58:54 unused systemd: Found device /dev/mapper/rhel_unused-root. >Oct 29 10:58:54 unused systemd: Starting File System Check on /dev/mapper/rhel_unused-root... >Oct 29 10:58:54 unused systemd-fsck: /sbin/fsck.xfs: XFS file system. >Oct 29 10:58:54 unused systemd: Started File System Check on /dev/mapper/rhel_unused-root. >Oct 29 10:58:54 unused systemd: Started dracut initqueue hook. >Oct 29 10:58:54 unused systemd: Started dracut pre-mount hook. >Oct 29 10:58:54 unused systemd: Mounting /sysroot... >Oct 29 10:58:54 unused systemd: Starting Remote File Systems (Pre). >Oct 29 10:58:54 unused systemd: Reached target Remote File Systems (Pre). >Oct 29 10:58:54 unused systemd: Starting Remote File Systems. >Oct 29 10:58:54 unused systemd: Reached target Remote File Systems. >Oct 29 10:58:54 unused kernel: SGI XFS with ACLs, security attributes, large block/inode numbers, no debug enabled >Oct 29 10:58:54 unused kernel: XFS (dm-0): Mounting Filesystem >Oct 29 10:59:00 unused kernel: XFS (dm-0): Ending clean mount >Oct 29 10:59:00 unused systemd: Mounted /sysroot. >Oct 29 10:59:00 unused systemd: Starting Initrd Root File System. >Oct 29 10:59:00 unused systemd: Reached target Initrd Root File System. >Oct 29 10:59:00 unused systemd: Starting Reload Configuration from the Real Root... >Oct 29 10:59:00 unused systemd: Reloading. >Oct 29 10:59:01 unused systemd: Started Reload Configuration from the Real Root. >Oct 29 10:59:01 unused systemd: Starting Initrd File Systems. >Oct 29 10:59:01 unused systemd: Reached target Initrd File Systems. >Oct 29 10:59:01 unused systemd: Started dracut mount hook. >Oct 29 10:59:01 unused systemd: Starting Initrd Default Target. >Oct 29 10:59:01 unused systemd: Reached target Initrd Default Target. >Oct 29 10:59:01 unused systemd: Starting dracut pre-pivot and cleanup hook... >Oct 29 10:59:01 unused systemd: Started dracut pre-pivot and cleanup hook. >Oct 29 10:59:01 unused systemd: Starting Cleaning Up and Shutting Down Daemons... >Oct 29 10:59:01 unused systemd: Stopping Cleaning Up and Shutting Down Daemons... >Oct 29 10:59:01 unused systemd: Starting Plymouth switch root service... >Oct 29 10:59:01 unused systemd: Stopped Cleaning Up and Shutting Down Daemons. >Oct 29 10:59:01 unused systemd: Stopping dracut pre-pivot and cleanup hook... >Oct 29 10:59:01 unused systemd: Stopped dracut pre-pivot and cleanup hook. >Oct 29 10:59:01 unused systemd: Stopping Remote File Systems. >Oct 29 10:59:01 unused systemd: Stopped target Remote File Systems. >Oct 29 10:59:01 unused systemd: Stopping Remote File Systems (Pre). >Oct 29 10:59:01 unused systemd: Stopped target Remote File Systems (Pre). >Oct 29 10:59:01 unused systemd: Stopping dracut initqueue hook... >Oct 29 10:59:01 unused systemd: Stopped dracut initqueue hook. >Oct 29 10:59:01 unused systemd: Stopping Initrd Default Target. >Oct 29 10:59:01 unused systemd: Stopped target Initrd Default Target. >Oct 29 10:59:01 unused systemd: Stopping Basic System. >Oct 29 10:59:01 unused systemd: Stopped target Basic System. >Oct 29 10:59:01 unused systemd: Stopping Slices. >Oct 29 10:59:01 unused systemd: Stopped target Slices. >Oct 29 10:59:01 unused systemd: Stopping Paths. >Oct 29 10:59:01 unused systemd: Stopped target Paths. >Oct 29 10:59:01 unused systemd: Stopping Timers. >Oct 29 10:59:01 unused systemd: Stopped target Timers. >Oct 29 10:59:01 unused systemd: Stopping Sockets. >Oct 29 10:59:01 unused systemd: Stopped target Sockets. >Oct 29 10:59:01 unused systemd: Stopping System Initialization. >Oct 29 10:59:01 unused systemd: Stopped target System Initialization. >Oct 29 10:59:01 unused systemd: Stopping Apply Kernel Variables... >Oct 29 10:59:01 unused systemd: Stopped Apply Kernel Variables. >Oct 29 10:59:01 unused systemd: Stopping udev Coldplug all Devices... >Oct 29 10:59:01 unused systemd: Stopped udev Coldplug all Devices. >Oct 29 10:59:01 unused systemd: Stopping Swap. >Oct 29 10:59:01 unused systemd: Stopped target Swap. >Oct 29 10:59:01 unused systemd: Stopping Local File Systems. >Oct 29 10:59:01 unused systemd: Stopped target Local File Systems. >Oct 29 10:59:01 unused systemd: Stopping udev Kernel Device Manager... >Oct 29 10:59:01 unused systemd: Stopped udev Kernel Device Manager. >Oct 29 10:59:01 unused systemd: Stopping dracut pre-udev hook... >Oct 29 10:59:01 unused systemd: Stopped dracut pre-udev hook. >Oct 29 10:59:01 unused systemd: Stopping dracut cmdline hook... >Oct 29 10:59:01 unused systemd: Stopped dracut cmdline hook. >Oct 29 10:59:01 unused systemd: Stopping Create static device nodes in /dev... >Oct 29 10:59:01 unused systemd: Stopped Create static device nodes in /dev. >Oct 29 10:59:01 unused systemd: Stopping Create list of required static device nodes for the current kernel... >Oct 29 10:59:01 unused systemd: Stopped Create list of required static device nodes for the current kernel. >Oct 29 10:59:01 unused systemd: Stopping udev Kernel Socket. >Oct 29 10:59:01 unused systemd: Closed udev Kernel Socket. >Oct 29 10:59:01 unused systemd: Stopping udev Control Socket. >Oct 29 10:59:01 unused systemd: Closed udev Control Socket. >Oct 29 10:59:01 unused systemd: Starting Cleanup udevd DB... >Oct 29 10:59:01 unused systemd: Started Cleanup udevd DB. >Oct 29 10:59:01 unused systemd: Starting Switch Root. >Oct 29 10:59:01 unused systemd: Reached target Switch Root. >Oct 29 10:59:01 unused systemd: Started Plymouth switch root service. >Oct 29 10:59:01 unused systemd: Starting Switch Root... >Oct 29 10:59:01 unused systemd: Switching root. >Oct 29 10:59:01 unused journal: Journal stopped >Oct 29 10:59:06 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 10:59:06 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 10:59:06 unused systemd-journald[110]: Received SIGTERM >Oct 29 10:59:06 unused systemd-cgroups-agent[466]: Failed to get D-Bus connection: Unknown error -1 >Oct 29 10:59:06 unused kernel: type=1404 audit(1414551542.094:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 >Oct 29 10:59:06 unused kernel: type=1403 audit(1414551542.340:3): policy loaded auid=4294967295 ses=4294967295 >Oct 29 10:59:06 unused systemd[1]: Successfully loaded SELinux policy in 283.302ms. >Oct 29 10:59:06 unused systemd[1]: Relabelled /dev and /run in 21.455ms. >Oct 29 10:59:06 unused journal: Journal started >Oct 29 10:59:06 unused systemd: systemd 208 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ) >Oct 29 10:59:06 unused systemd: Detected virtualization 'kvm'. >Oct 29 10:59:06 unused systemd: Set hostname to <unused>. >Oct 29 10:59:06 unused systemd: /usr/lib/systemd/system-generators/anaconda-generator exited with exit status 1. >Oct 29 10:59:06 unused systemd: [/usr/lib/systemd/system/lvm2-lvmetad.socket:9] Unknown lvalue 'RemoveOnStop' in section 'Socket' >Oct 29 10:59:06 unused systemd: [/usr/lib/systemd/system/dm-event.socket:10] Unknown lvalue 'RemoveOnStop' in section 'Socket' >Oct 29 10:59:06 unused systemd: Starting LVM2 metadata daemon... >Oct 29 10:59:06 unused systemd: Started LVM2 metadata daemon. >Oct 29 10:59:06 unused systemd: Started Load/Save Random Seed. >Oct 29 10:59:06 unused systemd: Started Import network configuration from initramfs. >Oct 29 10:59:06 unused lvm: 2 logical volume(s) in volume group "rhel_unused" monitored >Oct 29 10:59:06 unused systemd: Started Configure read-only root support. >Oct 29 10:59:06 unused systemd: Started Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. >Oct 29 10:59:07 unused systemd: Started Create static device nodes in /dev. >Oct 29 10:59:07 unused systemd: Starting udev Kernel Device Manager... >Oct 29 10:59:07 unused systemd: Starting Local File Systems (Pre). >Oct 29 10:59:07 unused systemd: Reached target Local File Systems (Pre). >Oct 29 10:59:07 unused systemd-udevd[533]: starting version 208 >Oct 29 10:59:07 unused systemd: Started udev Kernel Device Manager. >Oct 29 10:59:08 unused systemd: Started udev Wait for Complete Device Initialization. >Oct 29 10:59:08 unused systemd: Starting Activation of DM RAID sets... >Oct 29 10:59:08 unused systemd: Found device /dev/ttyS0. >Oct 29 10:59:08 unused kernel: input: PC Speaker as /devices/platform/pcspkr/input/input4 >Oct 29 10:59:08 unused kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 >Oct 29 10:59:08 unused kernel: ppdev: user-space parallel port driver >Oct 29 10:59:08 unused mtp-probe: checking bus 1, device 2: "/sys/devices/pci0000:00/0000:00:03.0/usb1/1-1" >Oct 29 10:59:08 unused mtp-probe: bus: 1, device: 2 was not an MTP device >Oct 29 10:59:08 unused systemd: Started Activation of DM RAID sets. >Oct 29 10:59:08 unused systemd: Starting Encrypted Volumes. >Oct 29 10:59:08 unused systemd: Reached target Encrypted Volumes. >Oct 29 10:59:08 unused kernel: alg: No test for __gcm-aes-aesni (__driver-gcm-aes-aesni) >Oct 29 10:59:08 unused systemd: Found device /dev/mapper/rhel_unused-swap. >Oct 29 10:59:08 unused systemd: Activating swap /dev/mapper/rhel_unused-swap... >Oct 29 10:59:08 unused systemd: Starting LVM2 PV scan on device 8:2... >Oct 29 10:59:08 unused kernel: alg: No test for crc32 (crc32-pclmul) >Oct 29 10:59:08 unused kernel: Adding 2097148k swap on /dev/mapper/rhel_unused-swap. Priority:-1 extents:1 across:2097148k FS >Oct 29 10:59:08 unused lvm: 2 logical volume(s) in volume group "rhel_unused" now active >Oct 29 10:59:08 unused systemd: Activated swap /dev/mapper/rhel_unused-swap. >Oct 29 10:59:08 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 29 10:59:08 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 29 10:59:08 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 29 10:59:08 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 29 10:59:09 unused systemd: Started LVM2 PV scan on device 8:2. >Oct 29 10:59:09 unused systemd: Starting Swap. >Oct 29 10:59:09 unused systemd: Reached target Swap. >Oct 29 10:59:09 unused systemd: Found device QEMU_HARDDISK. >Oct 29 10:59:09 unused systemd: Mounting /boot... >Oct 29 10:59:09 unused kernel: XFS (sda1): Mounting Filesystem >Oct 29 10:59:15 unused kernel: XFS (sda1): Ending clean mount >Oct 29 10:59:15 unused systemd: Mounted /boot. >Oct 29 10:59:15 unused systemd: Starting Local File Systems. >Oct 29 10:59:15 unused systemd: Reached target Local File Systems. >Oct 29 10:59:15 unused systemd: Started Mark the need to relabel after reboot. >Oct 29 10:59:15 unused systemd: Started Relabel all filesystems, if necessary. >Oct 29 10:59:15 unused systemd: Started Reconfigure the system on administrator request. >Oct 29 10:59:15 unused systemd: Starting Create Volatile Files and Directories... >Oct 29 10:59:15 unused systemd: Starting Tell Plymouth To Write Out Runtime Data... >Oct 29 10:59:15 unused systemd: Started Create Volatile Files and Directories. >Oct 29 10:59:15 unused systemd: Starting Security Auditing Service... >Oct 29 10:59:16 unused augenrules: /sbin/augenrules: No change >Oct 29 10:59:16 unused auditd[619]: Started dispatcher: /sbin/audispd pid: 630 >Oct 29 10:59:16 unused kernel: type=1305 audit(1414551556.070:4): audit_pid=619 old=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 >Oct 29 10:59:16 unused audispd: audispd initialized with q_depth=150 and 1 active plugins >Oct 29 10:59:16 unused auditd[619]: Init complete, auditd 2.4 listening for events (startup state enable) >Oct 29 10:59:16 unused augenrules: No rules >Oct 29 10:59:16 unused augenrules: enabled 1 >Oct 29 10:59:16 unused augenrules: flag 1 >Oct 29 10:59:16 unused augenrules: pid 619 >Oct 29 10:59:16 unused augenrules: rate_limit 0 >Oct 29 10:59:16 unused augenrules: backlog_limit 320 >Oct 29 10:59:16 unused augenrules: lost 0 >Oct 29 10:59:16 unused augenrules: backlog 1 >Oct 29 10:59:16 unused systemd: Started Security Auditing Service. >Oct 29 10:59:16 unused systemd: Started Tell Plymouth To Write Out Runtime Data. >Oct 29 10:59:16 unused systemd: Starting Update UTMP about System Reboot/Shutdown... >Oct 29 10:59:16 unused systemd: Started Update UTMP about System Reboot/Shutdown. >Oct 29 10:59:16 unused systemd: Starting System Initialization. >Oct 29 10:59:16 unused systemd: Reached target System Initialization. >Oct 29 10:59:16 unused systemd: Starting Daily Cleanup of Temporary Directories. >Oct 29 10:59:16 unused systemd: Started Daily Cleanup of Temporary Directories. >Oct 29 10:59:16 unused systemd: Starting Timers. >Oct 29 10:59:16 unused systemd: Reached target Timers. >Oct 29 10:59:16 unused systemd: Starting Open-iSCSI iscsid Socket. >Oct 29 10:59:16 unused systemd: Listening on Open-iSCSI iscsid Socket. >Oct 29 10:59:16 unused systemd: Starting Open-iSCSI iscsiuio Socket. >Oct 29 10:59:16 unused systemd: Listening on Open-iSCSI iscsiuio Socket. >Oct 29 10:59:16 unused systemd: Starting RPCbind Server Activation Socket. >Oct 29 10:59:17 unused systemd: Listening on RPCbind Server Activation Socket. >Oct 29 10:59:17 unused systemd: Starting Avahi mDNS/DNS-SD Stack Activation Socket. >Oct 29 10:59:17 unused systemd: Listening on Avahi mDNS/DNS-SD Stack Activation Socket. >Oct 29 10:59:17 unused systemd: Starting Flexible branding. >Oct 29 10:59:17 unused systemd: Started Flexible branding. >Oct 29 10:59:17 unused systemd: Starting Paths. >Oct 29 10:59:17 unused systemd: Reached target Paths. >Oct 29 10:59:17 unused systemd: Starting D-Bus System Message Bus Socket. >Oct 29 10:59:17 unused systemd: Listening on D-Bus System Message Bus Socket. >Oct 29 10:59:17 unused systemd: Starting Sockets. >Oct 29 10:59:17 unused systemd: Reached target Sockets. >Oct 29 10:59:17 unused systemd: Starting Basic System. >Oct 29 10:59:17 unused systemd: Reached target Basic System. >Oct 29 10:59:17 unused systemd: Starting firewalld - dynamic firewall daemon... >Oct 29 10:59:17 unused systemd: Started Load CPU microcode update. >Oct 29 10:59:17 unused systemd: Starting Dump dmesg to /var/log/dmesg... >Oct 29 10:59:17 unused systemd: Started Software RAID monitoring and management. >Oct 29 10:59:17 unused systemd: Starting libstoragemgmt plug-in server daemon... >Oct 29 10:59:17 unused systemd: Started libstoragemgmt plug-in server daemon. >Oct 29 10:59:17 unused systemd: Starting Avahi mDNS/DNS-SD Stack... >Oct 29 10:59:17 unused systemd: Starting NTP client/server... >Oct 29 10:59:17 unused systemd: Starting Kernel Samepage Merging... >Oct 29 10:59:17 unused systemd: Starting Rollback uncommitted netcf network config change transactions... >Oct 29 10:59:17 unused systemd: Starting System Logging Service... >Oct 29 10:59:18 unused systemd: Starting Resets System Activity Logs... >Oct 29 10:59:18 unused systemd: Starting Self Monitoring and Reporting Technology (SMART) Daemon... >Oct 29 10:59:18 unused netcf-transaction.sh: Running start: No pending transaction to rollback >Oct 29 10:59:18 unused systemd: Started Self Monitoring and Reporting Technology (SMART) Daemon. >Oct 29 10:59:18 unused systemd: Starting Dynamic System Tuning Daemon... >Oct 29 10:59:18 unused systemd: Starting Hardware RNG Entropy Gatherer Daemon... >Oct 29 10:59:18 unused systemd: Started Hardware RNG Entropy Gatherer Daemon. >Oct 29 10:59:19 unused systemd: Started OpenSSH Server Key Generation. >Oct 29 10:59:19 unused systemd: Starting irqbalance daemon... >Oct 29 10:59:19 unused rngd: Unable to open file: /dev/tpm0 >Oct 29 10:59:19 unused rngd: can't open any entropy source >Oct 29 10:59:19 unused rngd: Maybe RNG device modules are not loaded >Oct 29 10:59:19 unused avahi-daemon[645]: Found user 'avahi' (UID 70) and group 'avahi' (GID 70). >Oct 29 10:59:19 unused avahi-daemon[645]: Successfully dropped root privileges. >Oct 29 10:59:19 unused avahi-daemon[645]: avahi-daemon 0.6.31 starting up. >Oct 29 10:59:19 unused avahi-daemon[645]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns! >Oct 29 10:59:19 unused systemd: Started irqbalance daemon. >Oct 29 10:59:19 unused systemd: Starting Login Service... >Oct 29 10:59:19 unused systemd: Starting Accounts Service... >Oct 29 10:59:19 unused chronyd[668]: chronyd version 1.29.1 starting >Oct 29 10:59:19 unused systemd: Starting RealtimeKit Scheduling Policy Service... >Oct 29 10:59:19 unused chronyd[668]: Linux kernel major=3 minor=10 patch=0 >Oct 29 10:59:19 unused chronyd[668]: hz=100 shift_hz=7 freq_scale=1.00000000 nominal_tick=10000 slew_delta_tick=833 max_tick_bias=1000 shift_pll=2 >Oct 29 10:59:19 unused smartd[656]: smartd 6.2 2013-07-26 r3841 [x86_64-linux-3.10.0-175.el7.x86_64] (local build) >Oct 29 10:59:19 unused smartd[656]: Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org >Oct 29 10:59:19 unused smartd[656]: Opened configuration file /etc/smartmontools/smartd.conf >Oct 29 10:59:20 unused smartd[656]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices >Oct 29 10:59:20 unused smartd[656]: Device: /dev/sda, opened >Oct 29 10:59:20 unused smartd[656]: Device: /dev/sda, [QEMU QEMU HARDDISK 2.1.], 21.4 GB >Oct 29 10:59:20 unused chronyd[668]: Frequency -3.125 +/- 30.153 ppm read from /var/lib/chrony/drift >Oct 29 10:59:20 unused smartd[656]: Device: /dev/sda, Bad IEC (SMART) mode page, err=5, skip device >Oct 29 10:59:20 unused smartd[656]: Monitoring 0 ATA and 0 SCSI devices >Oct 29 10:59:20 unused systemd: Starting D-Bus System Message Bus... >Oct 29 10:59:20 unused systemd: Started D-Bus System Message Bus. >Oct 29 10:59:20 unused systemd: Started Dump dmesg to /var/log/dmesg. >Oct 29 10:59:20 unused systemd: Started Kernel Samepage Merging. >Oct 29 10:59:20 unused systemd: Started Rollback uncommitted netcf network config change transactions. >Oct 29 10:59:20 unused systemd: Started Resets System Activity Logs. >Oct 29 10:59:20 unused systemd: rngd.service: main process exited, code=exited, status=1/FAILURE >Oct 29 10:59:20 unused systemd: Unit rngd.service entered failed state. >Oct 29 10:59:20 unused systemd: Starting Kernel Samepage Merging (KSM) Tuning Daemon... >Oct 29 10:59:20 unused systemd: Started System Logging Service. >Oct 29 10:59:20 unused systemd: Started Kernel Samepage Merging (KSM) Tuning Daemon. >Oct 29 10:59:20 unused systemd: Started NTP client/server. >Oct 29 10:59:21 unused dbus-daemon: dbus[673]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 10:59:21 unused dbus[673]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 10:59:21 unused systemd: Started RealtimeKit Scheduling Policy Service. >Oct 29 10:59:21 unused avahi-daemon[645]: Successfully called chroot(). >Oct 29 10:59:21 unused avahi-daemon[645]: Successfully dropped remaining capabilities. >Oct 29 10:59:21 unused avahi-daemon[645]: No service file found in /etc/avahi/services. >Oct 29 10:59:21 unused systemd: Started Avahi mDNS/DNS-SD Stack. >Oct 29 10:59:21 unused systemd-logind: New seat seat0. >Oct 29 10:59:21 unused avahi-daemon[645]: Network interface enumeration completed. >Oct 29 10:59:21 unused avahi-daemon[645]: Registering HINFO record with values 'X86_64'/'LINUX'. >Oct 29 10:59:21 unused avahi-daemon[645]: Server startup complete. Host name is unused.local. Local service cookie is 2969731929. >Oct 29 10:59:21 unused systemd: Started Login Service. >Oct 29 10:59:21 unused systemd-logind: Watching system buttons on /dev/input/event0 (Power Button) >Oct 29 10:59:22 unused dbus-daemon: dbus[673]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Oct 29 10:59:22 unused dbus[673]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Oct 29 10:59:22 unused systemd: Starting Authorization Manager... >Oct 29 10:59:22 unused polkitd[711]: Started polkitd version 0.112 >Oct 29 10:59:23 unused dbus-daemon: dbus[673]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Oct 29 10:59:23 unused dbus[673]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Oct 29 10:59:23 unused systemd: Started Authorization Manager. >Oct 29 10:59:23 unused accounts-daemon[669]: started daemon version 0.6.35 >Oct 29 10:59:23 unused systemd: Started Accounts Service. >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused kernel: ip_tables: (C) 2000-2006 Netfilter Core Team >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused systemd: Started Dynamic System Tuning Daemon. >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:23 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused kernel: nf_conntrack version 0.5.0 (16384 buckets, 65536 max) >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused kernel: Ebtables v2.0 registered >Oct 29 10:59:24 unused kernel: Bridge firewalling registered >Oct 29 10:59:24 unused systemd: Started firewalld - dynamic firewall daemon. >Oct 29 10:59:24 unused systemd: Starting Network Manager... >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:24 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused NetworkManager[793]: <info> NetworkManager (version 0.9.9.1-42.git20140326.4dba720.el7) is starting... >Oct 29 10:59:25 unused NetworkManager[793]: <info> Read config: /etc/NetworkManager/NetworkManager.conf and conf.d: 10-ibft-plugin.conf, 00-server.conf >Oct 29 10:59:25 unused NetworkManager[793]: <info> WEXT support is disabled >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused NetworkManager[793]: <info> VPN: loaded org.freedesktop.NetworkManager.libreswan >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused NetworkManager[793]: ifcfg-rh: Acquired D-Bus service com.redhat.ifcfgrh1 >Oct 29 10:59:25 unused NetworkManager[793]: <info> Loaded plugin ifcfg-rh: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused NetworkManager[793]: <info> Loaded plugin iBFT: (c) 2014 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 10:59:25 unused NetworkManager[793]: <info> Loaded plugin keyfile: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused NetworkManager[793]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 10:59:25 unused NetworkManager[793]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-ens5 ... >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused NetworkManager[793]: ifcfg-rh: read connection 'ens5' >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused NetworkManager[793]: <info> monitoring kernel firmware directory '/lib/firmware'. >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused NetworkManager[793]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-adsl.so >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused NetworkManager[793]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-bluetooth.so >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused NetworkManager[793]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-wwan.so >Oct 29 10:59:25 unused NetworkManager[793]: <info> WiFi enabled by radio killswitch; enabled by state file >Oct 29 10:59:25 unused NetworkManager[793]: <info> WWAN enabled by radio killswitch; enabled by state file >Oct 29 10:59:25 unused NetworkManager[793]: <info> WiMAX enabled by radio killswitch; enabled by state file >Oct 29 10:59:25 unused NetworkManager[793]: <info> Networking is enabled by state file >Oct 29 10:59:25 unused systemd: Started Network Manager. >Oct 29 10:59:25 unused NetworkManager[793]: <info> (lo): link connected >Oct 29 10:59:25 unused NetworkManager[793]: <info> (lo): carrier is ON (but ignored) >Oct 29 10:59:25 unused NetworkManager[793]: <info> (lo): new Generic device (driver: 'unknown' ifindex: 1) >Oct 29 10:59:25 unused NetworkManager[793]: <info> (lo): exported as /org/freedesktop/NetworkManager/Devices/0 >Oct 29 10:59:25 unused systemd: Starting LSB: Bring up/down networking... >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused NetworkManager[793]: <info> (ens5): carrier is OFF (but ignored) >Oct 29 10:59:25 unused NetworkManager[793]: <info> (ens5): new Ethernet device (driver: 'e1000' ifindex: 2) >Oct 29 10:59:25 unused NetworkManager[793]: <info> (ens5): exported as /org/freedesktop/NetworkManager/Devices/1 >Oct 29 10:59:25 unused NetworkManager[793]: <info> (ens5): device state change: unmanaged -> unavailable (reason 'managed') [10 20 2] >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused NetworkManager[793]: <info> (ens5): preparing device >Oct 29 10:59:25 unused NetworkManager[793]: <info> (ens5): device state change: unavailable -> disconnected (reason 'none') [20 30 0] >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused kernel: IPv6: ADDRCONF(NETDEV_UP): ens5: link is not ready >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused NetworkManager[793]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 10:59:25 unused network: Bringing up loopback interface: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:25 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused dbus-daemon: dbus[673]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 10:59:26 unused dbus[673]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused NetworkManager[793]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 10:59:26 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused NetworkManager[793]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 10:59:26 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused NetworkManager[793]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 10:59:26 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused network: [ OK ] >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused NetworkManager[793]: <warn> Failed to activate 'ens5': Connection 'ens5' is not available on the device ens5 at this time. >Oct 29 10:59:26 unused NetworkManager[793]: <info> NetworkManager state is now DISCONNECTING >Oct 29 10:59:26 unused NetworkManager[793]: <info> NetworkManager state is now DISCONNECTED >Oct 29 10:59:26 unused network: Bringing up interface ens5: Error: Connection activation failed: Connection 'ens5' is not available on the device ens5 at this time. >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused network: [FAILED] >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused systemd: network.service: control process exited, code=exited status=1 >Oct 29 10:59:26 unused systemd: Failed to start LSB: Bring up/down networking. >Oct 29 10:59:26 unused systemd: Unit network.service entered failed state. >Oct 29 10:59:26 unused systemd: Starting Network. >Oct 29 10:59:26 unused systemd: Reached target Network. >Oct 29 10:59:26 unused systemd: Started Login and scanning of iSCSI devices. >Oct 29 10:59:26 unused systemd: Starting Remote File Systems (Pre). >Oct 29 10:59:26 unused systemd: Reached target Remote File Systems (Pre). >Oct 29 10:59:26 unused systemd: Starting Remote File Systems. >Oct 29 10:59:26 unused systemd: Reached target Remote File Systems. >Oct 29 10:59:26 unused systemd: Starting Trigger Flushing of Journal to Persistent Storage... >Oct 29 10:59:26 unused systemd: Starting Virtualization daemon... >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused systemd: Starting Enable periodic update of entitlement certificates.... >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused systemd: Starting Crash recovery kernel arming... >Oct 29 10:59:26 unused systemd: Starting Postfix Mail Transport Agent... >Oct 29 10:59:26 unused systemd: Starting OpenSSH server daemon... >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused systemd: Started OpenSSH server daemon. >Oct 29 10:59:26 unused systemd: Starting /etc/rc.d/rc.local Compatibility... >Oct 29 10:59:26 unused systemd: Starting LSB: Starts the Spacewalk Daemon... >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused systemd: Started Enable periodic update of entitlement certificates.. >Oct 29 10:59:26 unused rc.local: ens5: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500 >Oct 29 10:59:26 unused rc.local: ether 9a:4e:4f:50:51:52 txqueuelen 1000 (Ethernet) >Oct 29 10:59:26 unused rc.local: RX packets 254 bytes 16501 (16.1 KiB) >Oct 29 10:59:26 unused rc.local: RX errors 0 dropped 0 overruns 0 frame 0 >Oct 29 10:59:26 unused rc.local: TX packets 0 bytes 0 (0.0 B) >Oct 29 10:59:26 unused rc.local: TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >Oct 29 10:59:26 unused rc.local: lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 >Oct 29 10:59:26 unused rc.local: inet 127.0.0.1 netmask 255.0.0.0 >Oct 29 10:59:26 unused rc.local: inet6 ::1 prefixlen 128 scopeid 0x10<host> >Oct 29 10:59:26 unused rc.local: loop txqueuelen 0 (Local Loopback) >Oct 29 10:59:26 unused rc.local: RX packets 12 bytes 1296 (1.2 KiB) >Oct 29 10:59:26 unused rc.local: RX errors 0 dropped 0 overruns 0 frame 0 >Oct 29 10:59:26 unused rc.local: TX packets 12 bytes 1296 (1.2 KiB) >Oct 29 10:59:26 unused rc.local: TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >Oct 29 10:59:26 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused systemd: Started Trigger Flushing of Journal to Persistent Storage. >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused systemd: Started /etc/rc.d/rc.local Compatibility. >Oct 29 10:59:26 unused systemd: Starting Permit User Sessions... >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused systemd: PID file /var/run/rhnsd.pid not readable (yet?) after start. >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused systemd: Failed to start LSB: Starts the Spacewalk Daemon. >Oct 29 10:59:26 unused systemd: Unit rhnsd.service entered failed state. >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:26 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused systemd: Started Permit User Sessions. >Oct 29 10:59:27 unused systemd: Starting Command Scheduler... >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused systemd: Started Command Scheduler. >Oct 29 10:59:27 unused systemd: Starting Job spooling tools... >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused systemd: Started Job spooling tools. >Oct 29 10:59:27 unused systemd: Starting Wait for Plymouth Boot Screen to Quit... >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused systemd: Starting GNOME Display Manager... >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused libvirtd: 2014-10-29 02:59:27.261+0000: 1286: info : libvirt version: 1.2.8, package: 4.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2014-09-26-08:45:32, x86-021.build.eng.bos.redhat.com) >Oct 29 10:59:27 unused libvirtd: 2014-10-29 02:59:27.261+0000: 1286: warning : virGetHostname:665 : getaddrinfo failed for 'unused': Name or service not known >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused dbus[673]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.17" (uid=0 pid=1814 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.18" (uid=0 pid=1859 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Oct 29 10:59:27 unused dbus-daemon: dbus[673]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.17" (uid=0 pid=1814 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.18" (uid=0 pid=1859 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused NetworkManager[793]: <info> (ens5): link connected >Oct 29 10:59:27 unused NetworkManager[793]: <info> Auto-activating connection 'ens5'. >Oct 29 10:59:27 unused NetworkManager[793]: <info> Activation (ens5) starting connection 'ens5' >Oct 29 10:59:27 unused NetworkManager[793]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) scheduled... >Oct 29 10:59:27 unused NetworkManager[793]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) started... >Oct 29 10:59:27 unused NetworkManager[793]: <info> (ens5): device state change: disconnected -> prepare (reason 'none') [30 40 0] >Oct 29 10:59:27 unused NetworkManager[793]: <info> NetworkManager state is now CONNECTING >Oct 29 10:59:27 unused NetworkManager[793]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) scheduled... >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused NetworkManager[793]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) complete. >Oct 29 10:59:27 unused NetworkManager[793]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) starting... >Oct 29 10:59:27 unused NetworkManager[793]: <info> (ens5): device state change: prepare -> config (reason 'none') [40 50 0] >Oct 29 10:59:27 unused NetworkManager[793]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) successful. >Oct 29 10:59:27 unused NetworkManager[793]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) complete. >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:27 unused audispd: queue is full - dropping event >Oct 29 10:59:28 unused audispd: queue is full - dropping event >Oct 29 10:59:28 unused audispd: queue is full - dropping event >Oct 29 10:59:28 unused audispd: queue is full - dropping event >Oct 29 10:59:28 unused audispd: queue is full - dropping event >Oct 29 10:59:28 unused audispd: queue is full - dropping event >Oct 29 10:59:28 unused audispd: queue is full - dropping event >Oct 29 10:59:28 unused audispd: queue is full - dropping event >Oct 29 10:59:28 unused audispd: queue is full - dropping event >Oct 29 10:59:28 unused audispd: queue is full - dropping event >Oct 29 10:59:28 unused audispd: queue is full - dropping event >Oct 29 10:59:28 unused audispd: queue is full - dropping event >Oct 29 10:59:28 unused audispd: queue is full - dropping event >Oct 29 10:59:28 unused kernel: e1000: ens5 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX >Oct 29 10:59:28 unused systemd: Started GNOME Display Manager. >Oct 29 10:59:28 unused journal: libvirt version: 1.2.8, package: 4.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2014-09-26-08:45:32, x86-021.build.eng.bos.redhat.com) >Oct 29 10:59:28 unused journal: Module /usr/lib64/libvirt/connection-driver/libvirt_driver_lxc.so not accessible >Oct 29 10:59:28 unused kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens5: link becomes ready >Oct 29 10:59:29 unused systemd: Started Virtualization daemon. >Oct 29 10:59:29 unused setroubleshoot: Plugin Exception restorecon >Oct 29 10:59:29 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 10:59:29 unused kdumpctl: kexec: loaded kdump kernel >Oct 29 10:59:29 unused kdumpctl: Starting kdump: [OK] >Oct 29 10:59:29 unused systemd: Started Crash recovery kernel arming. >Oct 29 10:59:29 unused NetworkManager[793]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) scheduled. >Oct 29 10:59:29 unused NetworkManager[793]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) started... >Oct 29 10:59:29 unused NetworkManager[793]: <info> (ens5): device state change: config -> ip-config (reason 'none') [50 70 0] >Oct 29 10:59:29 unused NetworkManager[793]: <info> Activation (ens5) Beginning DHCPv4 transaction (timeout in 45 seconds) >Oct 29 10:59:29 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:30 unused systemd: Started Postfix Mail Transport Agent. >Oct 29 10:59:30 unused NetworkManager[793]: <info> dhclient started with pid 2540 >Oct 29 10:59:30 unused NetworkManager[793]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) complete. >Oct 29 10:59:30 unused NetworkManager[793]: <info> (ens5): DHCPv4 state changed nbi -> preinit >Oct 29 10:59:30 unused dhclient[2540]: DHCPDISCOVER on ens5 to 255.255.255.255 port 67 interval 5 (xid=0x6d76e9dc) >Oct 29 10:59:30 unused dhclient[2540]: DHCPREQUEST on ens5 to 255.255.255.255 port 67 (xid=0x6d76e9dc) >Oct 29 10:59:30 unused dhclient[2540]: DHCPOFFER from 10.66.111.254 >Oct 29 10:59:30 unused setroubleshoot: Plugin Exception restorecon_source >Oct 29 10:59:30 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 10:59:30 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:30 unused dhclient[2540]: DHCPACK from 10.66.111.254 (xid=0x6d76e9dc) >Oct 29 10:59:30 unused dhclient[2540]: bound to 10.66.110.85 -- renewal in 5711 seconds. >Oct 29 10:59:30 unused NetworkManager[793]: <info> (ens5): DHCPv4 state changed preinit -> bound >Oct 29 10:59:30 unused NetworkManager[793]: <info> address 10.66.110.85 >Oct 29 10:59:30 unused NetworkManager[793]: <info> plen 21 (255.255.248.0) >Oct 29 10:59:30 unused NetworkManager[793]: <info> gateway 10.66.111.254 >Oct 29 10:59:30 unused NetworkManager[793]: <info> server identifier 10.66.78.111 >Oct 29 10:59:30 unused NetworkManager[793]: <info> lease time 14400 >Oct 29 10:59:30 unused NetworkManager[793]: <info> nameserver '10.66.78.111' >Oct 29 10:59:30 unused NetworkManager[793]: <info> nameserver '10.66.78.117' >Oct 29 10:59:30 unused NetworkManager[793]: <info> nameserver '10.66.127.10' >Oct 29 10:59:30 unused NetworkManager[793]: <info> domain name 'englab.nay.redhat.com' >Oct 29 10:59:30 unused NetworkManager[793]: <info> domain name 'qe.lab.eng.nay.redhat.com' >Oct 29 10:59:30 unused NetworkManager[793]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Configure Commit) scheduled... >Oct 29 10:59:30 unused NetworkManager[793]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Commit) started... >Oct 29 10:59:30 unused NetworkManager[793]: <info> (ens5): device state change: ip-config -> ip-check (reason 'none') [70 80 0] >Oct 29 10:59:30 unused NetworkManager[793]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Commit) complete. >Oct 29 10:59:30 unused avahi-daemon[645]: Joining mDNS multicast group on interface ens5.IPv4 with address 10.66.110.85. >Oct 29 10:59:30 unused avahi-daemon[645]: New relevant interface ens5.IPv4 for mDNS. >Oct 29 10:59:30 unused avahi-daemon[645]: Registering new address record for 10.66.110.85 on ens5.IPv4. >Oct 29 10:59:30 unused NetworkManager[793]: <info> (ens5): device state change: ip-check -> secondaries (reason 'none') [80 90 0] >Oct 29 10:59:30 unused NetworkManager[793]: <info> (ens5): device state change: secondaries -> activated (reason 'none') [90 100 0] >Oct 29 10:59:30 unused NetworkManager[793]: <info> NetworkManager state is now CONNECTED_LOCAL >Oct 29 10:59:30 unused NetworkManager[793]: <info> Policy set 'ens5' (ens5) as default for IPv4 routing and DNS. >Oct 29 10:59:30 unused NetworkManager[793]: <info> Activation (ens5) successful, device activated. >Oct 29 10:59:30 unused dbus-daemon: dbus[673]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Oct 29 10:59:30 unused dbus[673]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Oct 29 10:59:30 unused systemd: Starting Network Manager Script Dispatcher Service... >Oct 29 10:59:30 unused dbus-daemon: dbus[673]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Oct 29 10:59:30 unused dbus[673]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Oct 29 10:59:30 unused systemd: Started Network Manager Script Dispatcher Service. >Oct 29 10:59:30 unused systemd: Unit iscsi.service cannot be reloaded because it is inactive. >Oct 29 10:59:30 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 10:59:30 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:31 unused avahi-daemon[645]: Registering new address record for fe80::984e:4fff:fe50:5152 on ens5.*. >Oct 29 10:59:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 10:59:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:31 unused systemd: Started Wait for Plymouth Boot Screen to Quit. >Oct 29 10:59:31 unused systemd: Starting Serial Getty on ttyS0... >Oct 29 10:59:31 unused systemd: Started Serial Getty on ttyS0. >Oct 29 10:59:31 unused systemd: Starting Login Prompts. >Oct 29 10:59:31 unused systemd: Reached target Login Prompts. >Oct 29 10:59:31 unused systemd: Starting Multi-User System. >Oct 29 10:59:31 unused systemd: Reached target Multi-User System. >Oct 29 10:59:31 unused systemd: Starting Graphical Interface. >Oct 29 10:59:31 unused systemd: Reached target Graphical Interface. >Oct 29 10:59:31 unused systemd: Starting Update UTMP about System Runlevel Changes... >Oct 29 10:59:31 unused systemd: Started Stop Read-Ahead Data Collection 10s After Completed Startup. >Oct 29 10:59:31 unused systemd: Started Update UTMP about System Runlevel Changes. >Oct 29 10:59:31 unused systemd: Startup finished in 828ms (kernel) + 8.545s (initrd) + 29.287s (userspace) = 38.661s. >Oct 29 10:59:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 10:59:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:31 unused systemd: Starting user-42.slice. >Oct 29 10:59:31 unused systemd: Created slice user-42.slice. >Oct 29 10:59:31 unused systemd: Starting Session c1 of user gdm. >Oct 29 10:59:31 unused systemd-logind: New session c1 of user gdm. >Oct 29 10:59:31 unused systemd: Started Session c1 of user gdm. >Oct 29 10:59:31 unused systemd-logind: Linked /tmp/.X11-unix/X0 to /run/user/42/X11-display. >Oct 29 10:59:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4232f3ec-5ccd-4850-ba76-4a70ff4565b6 >Oct 29 10:59:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 29 10:59:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:32 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 29 10:59:32 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:32 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f60195bb-d64d-4eb0-a8f4-cf8a2b920ac8 >Oct 29 10:59:32 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:32 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5ab16217-4ece-422d-83ed-2d510b7f6e4a >Oct 29 10:59:32 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:32 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l adc127d5-3ba3-4600-a18a-c60d41d563f5 >Oct 29 10:59:32 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:32 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 10:59:32 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:32 unused NetworkManager[793]: <info> startup complete >Oct 29 10:59:32 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 06db745f-002f-4e84-a79a-b463031747bc >Oct 29 10:59:32 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:32 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 06db745f-002f-4e84-a79a-b463031747bc >Oct 29 10:59:32 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:32 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 10:59:33 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:33 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8a2839f5-9652-4d11-b7f0-45cf9ee50720 >Oct 29 10:59:33 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:33 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 10:59:33 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:33 unused dbus-daemon: dbus[673]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Oct 29 10:59:33 unused dbus[673]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Oct 29 10:59:33 unused systemd: Starting Daemon for power management... >Oct 29 10:59:33 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 10:59:33 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:33 unused dbus-daemon: dbus[673]: [system] Successfully activated service 'org.freedesktop.UPower' >Oct 29 10:59:33 unused dbus[673]: [system] Successfully activated service 'org.freedesktop.UPower' >Oct 29 10:59:33 unused systemd: Started Daemon for power management. >Oct 29 10:59:33 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l bb129500-3477-472a-b1a1-1b7d123c1da8 >Oct 29 10:59:33 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:33 unused gnome-session: (gnome-settings-daemon:2845): power-plugin-WARNING **: failed to turn the panel on: Display is not DPMS capable >Oct 29 10:59:33 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d95da5c3-8c53-450d-a9b2-dfb19b652de8 >Oct 29 10:59:33 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:33 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l db8f5c38-2bac-4875-a619-b204531cc812 >Oct 29 10:59:33 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:33 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 149193bb-28ed-4b94-9604-5e107a9da7e2 >Oct 29 10:59:33 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:34 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2003831-eae3-45bc-9b03-1dd96a73f949 >Oct 29 10:59:34 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:34 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d95da5c3-8c53-450d-a9b2-dfb19b652de8 >Oct 29 10:59:34 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:34 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 10:59:34 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:34 unused dbus-daemon: dbus[673]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Oct 29 10:59:34 unused dbus[673]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Oct 29 10:59:34 unused gnome-session: Entering running state >Oct 29 10:59:34 unused systemd: Starting Manage, Install and Generate Color Profiles... >Oct 29 10:59:34 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5ab16217-4ece-422d-83ed-2d510b7f6e4a >Oct 29 10:59:34 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:34 unused colord: Using config file /etc/colord.conf >Oct 29 10:59:34 unused colord: Using mapping database file /var/lib/colord/mapping.db >Oct 29 10:59:34 unused colord: Using device database file /var/lib/colord/storage.db >Oct 29 10:59:34 unused colord: loaded plugin libcd_plugin_camera.so >Oct 29 10:59:34 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 10:59:34 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:34 unused colord: loaded plugin libcd_plugin_scanner.so >Oct 29 10:59:34 unused colord: Daemon ready for requests >Oct 29 10:59:34 unused dbus-daemon: dbus[673]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Oct 29 10:59:34 unused dbus[673]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Oct 29 10:59:34 unused systemd: Started Manage, Install and Generate Color Profiles. >Oct 29 10:59:34 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 41005440-a55b-4233-93f3-db86ea99daba >Oct 29 10:59:34 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:34 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l af15d032-e5b6-477a-a4e0-d0db84c92e84 >Oct 29 10:59:34 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:35 unused rtkit-daemon[670]: Successfully made thread 3093 of process 3093 (/usr/bin/pulseaudio) owned by '42' high priority at nice level -11. >Oct 29 10:59:35 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l af15d032-e5b6-477a-a4e0-d0db84c92e84 >Oct 29 10:59:35 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:35 unused colord: Profile added: icc-021ec903471f953c28c57ccde43f9134 >Oct 29 10:59:35 unused colord: Profile added: icc-7e1e684edc9a0671f5305d656d8cb8c9 >Oct 29 10:59:35 unused colord: Profile added: icc-0f6451e33e7342d0f90bb960912bb812 >Oct 29 10:59:35 unused colord: Profile added: icc-8f465237bb45ee1d16fdbd6b4038c719 >Oct 29 10:59:35 unused colord: Profile added: icc-8daff74b7142df23f76b3d5ef126bbf9 >Oct 29 10:59:35 unused colord: Profile added: icc-f16a3fe7a0d2f471188cf45202ae43ac >Oct 29 10:59:35 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 75ef4f58-c198-49a6-9668-ae14c8a7007b >Oct 29 10:59:35 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:35 unused dbus-daemon: dbus[673]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 29 10:59:35 unused dbus[673]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 29 10:59:35 unused systemd: Starting Locale Service... >Oct 29 10:59:35 unused gnome-session: (gnome-settings-daemon:2845): color-plugin-WARNING **: failed to get edid: unable to get EDID for output >Oct 29 10:59:35 unused dbus-daemon: dbus[673]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 29 10:59:35 unused dbus[673]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 29 10:59:35 unused systemd: Started Locale Service. >Oct 29 10:59:35 unused colord: Device added: xrandr-Virtual-0 >Oct 29 10:59:35 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b91b4263-e2c9-413f-9c5f-7869cacdb578 >Oct 29 10:59:35 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:35 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 97aea7ca-00fe-4e40-af8e-e0ec40282528 >Oct 29 10:59:35 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:35 unused gnome-session: (gnome-settings-daemon:2845): color-plugin-WARNING **: unable to get EDID for xrandr-Virtual-0: unable to get EDID for output >Oct 29 10:59:35 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 94cf47a7-5a5c-405c-ab69-1601b787f238 >Oct 29 10:59:35 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:35 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 05d5fa63-cbd7-453f-b673-c378b16914f0 >Oct 29 10:59:35 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:35 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 10:59:35 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:35 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::primary after class was initialised >Oct 29 10:59:35 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::index after class was initialised >Oct 29 10:59:35 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 10:59:35 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:36 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 10:59:36 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:36 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8a64fd6d-c54b-4627-b7b5-44f0b14979dd >Oct 29 10:59:36 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:36 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 396a1310-4088-41c8-90a8-d43b4f19499c >Oct 29 10:59:36 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:36 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 396a1310-4088-41c8-90a8-d43b4f19499c >Oct 29 10:59:36 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:36 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d772382b-e332-4fba-8873-f558166b6023 >Oct 29 10:59:36 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:36 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2094586-a8f8-4bc1-af02-534887cfd2f4 >Oct 29 10:59:36 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:36 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2094586-a8f8-4bc1-af02-534887cfd2f4 >Oct 29 10:59:36 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:36 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0b13c0cf-312e-4166-b485-88d815f566fb >Oct 29 10:59:37 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:37 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b427ecb2-8229-4dc3-b9ee-ffea01dcd104 >Oct 29 10:59:37 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:37 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 10:59:37 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:37 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0e7f911c-862c-4a1b-bdef-924387d5c7e9 >Oct 29 10:59:37 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:37 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 10:59:37 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:37 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 04b4c9d6-e337-439c-bb70-255a7898dcb3 >Oct 29 10:59:37 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:37 unused gnome-session: JS LOG: GNOME Shell started at Wed Oct 29 2014 10:59:37 GMT+0800 (CST) >Oct 29 10:59:37 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 10:59:37 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:37 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5f10f707-7a84-461f-9e81-f835d4ea195d >Oct 29 10:59:37 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:38 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 10:59:38 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:38 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0e378e0b-9b3c-4d2f-84b9-ce2845665953 >Oct 29 10:59:38 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:38 unused dbus-daemon: dbus[673]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Oct 29 10:59:38 unused dbus[673]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Oct 29 10:59:38 unused systemd: Starting Fingerprint Authentication Daemon... >Oct 29 10:59:38 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b94cfdf3-87b2-4b6e-abf5-837aee9d5e47 >Oct 29 10:59:38 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:38 unused dbus-daemon: dbus[673]: [system] Successfully activated service 'net.reactivated.Fprint' >Oct 29 10:59:38 unused dbus[673]: [system] Successfully activated service 'net.reactivated.Fprint' >Oct 29 10:59:38 unused systemd: Started Fingerprint Authentication Daemon. >Oct 29 10:59:38 unused fprintd: Launching FprintObject >Oct 29 10:59:38 unused fprintd: ** Message: D-Bus service launched with name: net.reactivated.Fprint >Oct 29 10:59:38 unused fprintd: ** Message: entering main loop >Oct 29 10:59:38 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 10:59:38 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:38 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 829d18ca-3d16-4e5a-8496-a95d9ab10d6c >Oct 29 10:59:38 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:38 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 63dc4b7a-9372-4551-bd5d-9f0980157bc4 >Oct 29 10:59:38 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:38 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l be15d920-943b-4dae-ab10-813bdf4c9056 >Oct 29 10:59:38 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:38 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 10:59:38 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:39 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f31e2e16-ef9a-43df-bba1-a28015fc34cb >Oct 29 10:59:39 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:39 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 10:59:39 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:39 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f31e2e16-ef9a-43df-bba1-a28015fc34cb >Oct 29 10:59:39 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:39 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 10:59:39 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:39 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 10:59:39 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:39 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 10:59:39 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:40 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 10:59:40 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:40 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 10:59:40 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:40 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 88a7869a-040a-4f0e-80c5-b6a4e8755bb3 >Oct 29 10:59:40 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:40 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 10:59:40 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:40 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 10:59:40 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:40 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l dc7e7c9b-7e67-4b25-821f-418ef1def3e4 >Oct 29 10:59:40 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:40 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 10:59:40 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:40 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 10:59:40 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:41 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 10:59:41 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:41 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8dd8c574-fc63-4b6f-9f6c-45c2df7870d4 >Oct 29 10:59:41 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:41 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 10:59:41 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:41 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 3ed0fa73-53ef-48c0-bb88-c1fd8f856461 >Oct 29 10:59:41 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:41 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 10:59:41 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 10:59:41 unused dbus-daemon: string index out of range >Oct 29 10:59:41 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 29 11:00:01 unused dbus-daemon: dbus[673]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:00:01 unused dbus[673]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:00:01 unused systemd: Starting user-0.slice. >Oct 29 11:00:01 unused systemd: Created slice user-0.slice. >Oct 29 11:00:01 unused systemd: Starting Session 1 of user root. >Oct 29 11:00:01 unused systemd: Started Session 1 of user root. >Oct 29 11:00:02 unused dbus-daemon: dbus[673]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:00:02 unused dbus[673]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:00:02 unused journal: Suppressed 2797 messages from /system.slice/dbus.service >Oct 29 11:00:03 unused setroubleshoot: Plugin Exception restorecon_source >Oct 29 11:00:03 unused setroubleshoot: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . For complete SELinux messages. run sealert -l 48fca7c8-976d-46e5-9bdc-8be5be60840d >Oct 29 11:00:03 unused python: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that prelink should be allowed setattr access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:00:08 unused fprintd: ** Message: No devices in use, exit >Oct 29 11:00:13 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 29 11:01:01 unused dbus-daemon: dbus[673]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:01:01 unused dbus[673]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:01:01 unused systemd: Created slice user-0.slice. >Oct 29 11:01:01 unused systemd: Starting Session 2 of user root. >Oct 29 11:01:01 unused systemd: Started Session 2 of user root. >Oct 29 11:01:02 unused dbus-daemon: dbus[673]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:01:02 unused dbus[673]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:01:03 unused setroubleshoot: Plugin Exception restorecon_source >Oct 29 11:01:03 unused setroubleshoot: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . For complete SELinux messages. run sealert -l 48fca7c8-976d-46e5-9bdc-8be5be60840d >Oct 29 11:01:03 unused python: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that prelink should be allowed setattr access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:01:13 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 29 11:01:28 unused dbus-daemon: dbus[673]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Oct 29 11:01:28 unused dbus[673]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Oct 29 11:01:28 unused systemd: Starting Fingerprint Authentication Daemon... >Oct 29 11:01:28 unused dbus-daemon: dbus[673]: [system] Successfully activated service 'net.reactivated.Fprint' >Oct 29 11:01:28 unused dbus[673]: [system] Successfully activated service 'net.reactivated.Fprint' >Oct 29 11:01:28 unused fprintd: Launching FprintObject >Oct 29 11:01:28 unused fprintd: ** Message: D-Bus service launched with name: net.reactivated.Fprint >Oct 29 11:01:28 unused fprintd: ** Message: entering main loop >Oct 29 11:01:28 unused systemd: Started Fingerprint Authentication Daemon. >Oct 29 11:01:31 unused systemd: Starting user-1000.slice. >Oct 29 11:01:31 unused systemd: Created slice user-1000.slice. >Oct 29 11:01:31 unused systemd: Starting Session 3 of user licong. >Oct 29 11:01:31 unused systemd-logind: New session 3 of user licong. >Oct 29 11:01:31 unused systemd-logind: Linked /tmp/.X11-unix/X0 to /run/user/1000/X11-display. >Oct 29 11:01:31 unused systemd: Started Session 3 of user licong. >Oct 29 11:01:32 unused gnome-session: g_dbus_connection_real_closed: Remote peer vanished with error: Underlying GIOStream returned 0 bytes on an async read (g-io-error-quark, 0). Exiting. >Oct 29 11:01:32 unused colord: device removed: xrandr-Virtual-0 >Oct 29 11:01:32 unused gdm: Child process -2697 was already dead. >Oct 29 11:01:34 unused gnome-session: GNOME_KEYRING_CONTROL=/run/user/1000/keyring-TLU63b >Oct 29 11:01:34 unused gnome-session: GPG_AGENT_INFO=/run/user/1000/keyring-TLU63b/gpg:0:1 >Oct 29 11:01:34 unused gnome-session: GNOME_KEYRING_CONTROL=/run/user/1000/keyring-TLU63b >Oct 29 11:01:34 unused gnome-session: GPG_AGENT_INFO=/run/user/1000/keyring-TLU63b/gpg:0:1 >Oct 29 11:01:34 unused gnome-session: SSH_AUTH_SOCK=/run/user/1000/keyring-TLU63b/ssh >Oct 29 11:01:34 unused gnome-session: GNOME_KEYRING_CONTROL=/run/user/1000/keyring-TLU63b >Oct 29 11:01:34 unused gnome-session: GPG_AGENT_INFO=/run/user/1000/keyring-TLU63b/gpg:0:1 >Oct 29 11:01:34 unused gnome-session: GNOME_KEYRING_CONTROL=/run/user/1000/keyring-TLU63b >Oct 29 11:01:34 unused gnome-session: GPG_AGENT_INFO=/run/user/1000/keyring-TLU63b/gpg:0:1 >Oct 29 11:01:34 unused kernel: fuse init (API version 7.22) >Oct 29 11:01:34 unused systemd: Mounting FUSE Control File System... >Oct 29 11:01:34 unused systemd: Mounted FUSE Control File System. >Oct 29 11:01:34 unused gnome-session: (gnome-settings-daemon:3928): power-plugin-WARNING **: failed to turn the panel on: Display is not DPMS capable >Oct 29 11:01:34 unused dbus-daemon: dbus[673]: [system] Activating via systemd: service name='org.freedesktop.UDisks2' unit='udisks2.service' >Oct 29 11:01:34 unused dbus[673]: [system] Activating via systemd: service name='org.freedesktop.UDisks2' unit='udisks2.service' >Oct 29 11:01:34 unused systemd: Starting Disk Manager... >Oct 29 11:01:34 unused udisksd[3974]: udisks daemon version 2.1.2 starting >Oct 29 11:01:34 unused dbus-daemon: dbus[673]: [system] Successfully activated service 'org.freedesktop.UDisks2' >Oct 29 11:01:34 unused dbus[673]: [system] Successfully activated service 'org.freedesktop.UDisks2' >Oct 29 11:01:34 unused udisksd[3974]: Acquired the name org.freedesktop.UDisks2 on the system message bus >Oct 29 11:01:34 unused systemd: Started Disk Manager. >Oct 29 11:01:35 unused goa[3999]: goa-daemon version 3.8.5 starting [main.c:113, main()] >Oct 29 11:01:35 unused goa[3999]: GoaKerberosIdentityManager: Using polling for change notification for credential cache type 'KEYRING' [goakerberosidentitymanager.c:1386, monitor_credentials_cache()] >Oct 29 11:01:35 unused dbus[673]: [system] Activating service name='org.freedesktop.PackageKit' (using servicehelper) >Oct 29 11:01:35 unused dbus-daemon: dbus[673]: [system] Activating service name='org.freedesktop.PackageKit' (using servicehelper) >Oct 29 11:01:35 unused rtkit-daemon[670]: Successfully made thread 4031 of process 4031 (/usr/bin/pulseaudio) owned by '1000' high priority at nice level -11. >Oct 29 11:01:35 unused dbus-daemon: dbus[673]: [system] Successfully activated service 'org.freedesktop.PackageKit' >Oct 29 11:01:35 unused dbus[673]: [system] Successfully activated service 'org.freedesktop.PackageKit' >Oct 29 11:01:35 unused dbus-daemon: dbus[673]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' >Oct 29 11:01:35 unused dbus[673]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' >Oct 29 11:01:35 unused systemd: Starting Bluetooth service... >Oct 29 11:01:35 unused bluetoothd: bluetoothd[4040]: Bluetooth daemon 4.101 >Oct 29 11:01:35 unused bluetoothd[4040]: Bluetooth daemon 4.101 >Oct 29 11:01:35 unused dbus-daemon: dbus[673]: [system] Successfully activated service 'org.bluez' >Oct 29 11:01:35 unused dbus[673]: [system] Successfully activated service 'org.bluez' >Oct 29 11:01:35 unused systemd: Started Bluetooth service. >Oct 29 11:01:35 unused bluetoothd: bluetoothd[4040]: Starting SDP server >Oct 29 11:01:35 unused bluetoothd[4040]: Starting SDP server >Oct 29 11:01:35 unused kernel: Bluetooth: Core ver 2.16 >Oct 29 11:01:35 unused kernel: NET: Registered protocol family 31 >Oct 29 11:01:35 unused kernel: Bluetooth: HCI device and connection manager initialized >Oct 29 11:01:35 unused kernel: Bluetooth: HCI socket layer initialized >Oct 29 11:01:35 unused kernel: Bluetooth: L2CAP socket layer initialized >Oct 29 11:01:35 unused kernel: Bluetooth: SCO socket layer initialized >Oct 29 11:01:35 unused kernel: Bluetooth: BNEP (Ethernet Emulation) ver 1.3 >Oct 29 11:01:35 unused kernel: Bluetooth: BNEP filters: protocol multicast >Oct 29 11:01:35 unused kernel: Bluetooth: BNEP socket layer initialized >Oct 29 11:01:35 unused bluetoothd: bluetoothd[4040]: Parsing /etc/bluetooth/input.conf failed: No such file or directory >Oct 29 11:01:35 unused bluetoothd[4040]: Parsing /etc/bluetooth/input.conf failed: No such file or directory >Oct 29 11:01:35 unused bluetoothd: bluetoothd[4040]: Bluetooth Management interface initialized >Oct 29 11:01:35 unused bluetoothd[4040]: Bluetooth Management interface initialized >Oct 29 11:01:35 unused NetworkManager[793]: <info> use BlueZ version 4 >Oct 29 11:01:35 unused rtkit-daemon[670]: Successfully made thread 4048 of process 4048 (/usr/bin/pulseaudio) owned by '1000' high priority at nice level -11. >Oct 29 11:01:35 unused pulseaudio[4048]: [pulseaudio] pid.c: Daemon already running. >Oct 29 11:01:35 unused gnome-session: (gnome-settings-daemon:3928): color-plugin-WARNING **: failed to get edid: unable to get EDID for output >Oct 29 11:01:35 unused colord: Device added: xrandr-Virtual-0 >Oct 29 11:01:35 unused gnome-session: (gnome-settings-daemon:3928): color-plugin-WARNING **: unable to get EDID for xrandr-Virtual-0: unable to get EDID for output >Oct 29 11:01:35 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::primary after class was initialised >Oct 29 11:01:35 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::index after class was initialised >Oct 29 11:01:36 unused NetworkManager[793]: <info> NetworkManager state is now CONNECTED_GLOBAL >Oct 29 11:01:36 unused gnome-session: JS LOG: GNOME Shell started at Wed Oct 29 2014 11:01:36 GMT+0800 (CST) >Oct 29 11:01:37 unused gnome-session: Failed to play sound: File or data not found >Oct 29 11:01:37 unused gnome-session: Entering running state >Oct 29 11:01:37 unused gnome-session: Tracker-Message: Importing config file to GSettings >Oct 29 11:01:37 unused gnome-session: Tracker-Message: Importing config file to GSettings >Oct 29 11:01:37 unused gnome-session: (tracker-store:4246): Tracker-CRITICAL **: D-Bus service name:'org.freedesktop.Tracker1' is already taken, perhaps the daemon is already running? >Oct 29 11:01:37 unused gnome-session: Tracker-Message: Importing config file to GSettings >Oct 29 11:01:38 unused gnome-session: (tracker-miner-fs:4244): GLib-CRITICAL **: g_timer_continue: assertion 'timer->active == FALSE' failed >Oct 29 11:01:38 unused dbus-daemon: dbus[673]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' >Oct 29 11:01:38 unused dbus[673]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' >Oct 29 11:01:38 unused systemd: Starting Hostname Service... >Oct 29 11:01:38 unused dbus-daemon: dbus[673]: [system] Successfully activated service 'org.freedesktop.hostname1' >Oct 29 11:01:38 unused dbus[673]: [system] Successfully activated service 'org.freedesktop.hostname1' >Oct 29 11:01:38 unused systemd: Started Hostname Service. >Oct 29 11:01:52 unused systemd-logind: Removed session c1. >Oct 29 11:01:58 unused fprintd: ** Message: No devices in use, exit >Oct 29 11:02:21 unused systemd: Starting Session 4 of user root. >Oct 29 11:02:21 unused systemd-logind: New session 4 of user root. >Oct 29 11:02:21 unused systemd: Started Session 4 of user root. >Oct 29 11:02:36 unused chronyd[668]: Selected source 10.5.26.10 >Oct 29 11:02:36 unused chronyd[668]: System clock wrong by 0.537064 seconds, adjustment started >Oct 29 11:02:52 unused systemd: Stopping Session 4 of user root. >Oct 29 11:02:52 unused systemd: Stopping Session 3 of user licong. >Oct 29 11:02:52 unused systemd: Stopping Session 2 of user root. >Oct 29 11:02:52 unused systemd: Stopping user-42.slice. >Oct 29 11:02:52 unused systemd: Removed slice user-42.slice. >Oct 29 11:02:52 unused systemd: Stopping LVM2 PV scan on device 8:2... >Oct 29 11:02:52 unused systemd: Stopping system-getty.slice. >Oct 29 11:02:52 unused systemd: Removed slice system-getty.slice. >Oct 29 11:02:52 unused systemd: Stopping Dump dmesg to /var/log/dmesg... >Oct 29 11:02:52 unused systemd: Stopped Dump dmesg to /var/log/dmesg. >Oct 29 11:02:52 unused gnome-session: Received signal:15->'Terminated' >Oct 29 11:02:52 unused systemd: Stopping Graphical Interface. >Oct 29 11:02:52 unused systemd: Stopped target Graphical Interface. >Oct 29 11:02:52 unused systemd: Stopping Multi-User System. >Oct 29 11:02:52 unused systemd: Stopped target Multi-User System. >Oct 29 11:02:52 unused systemd: Stopping Command Scheduler... >Oct 29 11:02:52 unused systemd: Stopping libstoragemgmt plug-in server daemon... >Oct 29 11:02:52 unused systemd: Stopping Virtualization daemon... >Oct 29 11:02:52 unused systemd: Stopping Job spooling tools... >Oct 29 11:02:52 unused systemd: Stopping NTP client/server... >Oct 29 11:02:52 unused systemd: Stopping Kernel Samepage Merging (KSM) Tuning Daemon... >Oct 29 11:02:52 unused rsyslogd: [origin software="rsyslogd" swVersion="7.4.7" x-pid="651" x-info="http://www.rsyslog.com"] exiting on signal 15. >Oct 29 11:03:33 unused rsyslogd: [origin software="rsyslogd" swVersion="7.4.7" x-pid="653" x-info="http://www.rsyslog.com"] start >Oct 29 11:03:00 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:03:00 unused kernel: Initializing cgroup subsys cpuset >Oct 29 11:03:00 unused kernel: Initializing cgroup subsys cpu >Oct 29 11:03:00 unused kernel: Initializing cgroup subsys cpuacct >Oct 29 11:03:00 unused kernel: Linux version 3.10.0-175.el7.x86_64 (mockbuild@x86-018.build.eng.bos.redhat.com) (gcc version 4.8.3 20140911 (Red Hat 4.8.3-7) (GCC) ) #1 SMP Tue Sep 30 02:14:47 EDT 2014 >Oct 29 11:03:00 unused kernel: Command line: BOOT_IMAGE=/vmlinuz-3.10.0-175.el7.x86_64 root=/dev/mapper/rhel_unused-root ro crashkernel=auto rd.lvm.lv=rhel_unused/root rd.lvm.lv=rhel_unused/swap console=tty0 console=ttyS0,115200 LANG=en_US.UTF-8 >Oct 29 11:03:00 unused kernel: e820: BIOS-provided physical RAM map: >Oct 29 11:03:00 unused kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable >Oct 29 11:03:00 unused kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved >Oct 29 11:03:00 unused kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved >Oct 29 11:03:00 unused kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdffff] usable >Oct 29 11:03:00 unused kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved >Oct 29 11:03:00 unused kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved >Oct 29 11:03:00 unused kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved >Oct 29 11:03:00 unused kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable >Oct 29 11:03:00 unused kernel: NX (Execute Disable) protection: active >Oct 29 11:03:00 unused kernel: SMBIOS 2.8 present. >Oct 29 11:03:00 unused kernel: Hypervisor detected: KVM >Oct 29 11:03:00 unused kernel: No AGP bridge found >Oct 29 11:03:00 unused kernel: e820: last_pfn = 0x140000 max_arch_pfn = 0x400000000 >Oct 29 11:03:00 unused kernel: x86 PAT enabled: cpu 0, old 0x7040600070406, new 0x7010600070106 >Oct 29 11:03:00 unused kernel: e820: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 >Oct 29 11:03:00 unused kernel: found SMP MP-table at [mem 0x000f2030-0x000f203f] mapped at [ffff8800000f2030] >Oct 29 11:03:00 unused kernel: init_memory_mapping: [mem 0x00000000-0x000fffff] >Oct 29 11:03:00 unused kernel: init_memory_mapping: [mem 0x13fe00000-0x13fffffff] >Oct 29 11:03:00 unused kernel: init_memory_mapping: [mem 0x13c000000-0x13fdfffff] >Oct 29 11:03:00 unused kernel: init_memory_mapping: [mem 0x100000000-0x13bffffff] >Oct 29 11:03:00 unused kernel: init_memory_mapping: [mem 0x00100000-0xbffdffff] >Oct 29 11:03:00 unused kernel: RAMDISK: [mem 0x35c37000-0x36e13fff] >Oct 29 11:03:00 unused kernel: Reserving 161MB of memory at 688MB for crashkernel (System RAM: 4095MB) >Oct 29 11:03:00 unused kernel: ACPI: RSDP 00000000000f1d90 00014 (v00 BOCHS ) >Oct 29 11:03:00 unused kernel: ACPI: RSDT 00000000bffe1931 00030 (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001) >Oct 29 11:03:00 unused kernel: ACPI: FACP 00000000bffe0b37 00074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001) >Oct 29 11:03:00 unused kernel: ACPI: DSDT 00000000bffe0040 00AF7 (v01 BOCHS BXPCDSDT 00000001 BXPC 00000001) >Oct 29 11:03:00 unused kernel: ACPI: FACS 00000000bffe0000 00040 >Oct 29 11:03:00 unused kernel: ACPI: SSDT 00000000bffe0bab 00CF6 (v01 BOCHS BXPCSSDT 00000001 BXPC 00000001) >Oct 29 11:03:00 unused kernel: ACPI: APIC 00000000bffe18a1 00090 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001) >Oct 29 11:03:00 unused kernel: No NUMA configuration found >Oct 29 11:03:00 unused kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] >Oct 29 11:03:00 unused kernel: Initmem setup node 0 [mem 0x00000000-0x13fffffff] >Oct 29 11:03:00 unused kernel: NODE_DATA [mem 0x13ffd6000-0x13fffcfff] >Oct 29 11:03:00 unused kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 >Oct 29 11:03:00 unused kernel: kvm-clock: cpu 0, msr 1:3ff86001, primary cpu clock >Oct 29 11:03:00 unused kernel: Zone ranges: >Oct 29 11:03:00 unused kernel: DMA [mem 0x00001000-0x00ffffff] >Oct 29 11:03:00 unused kernel: DMA32 [mem 0x01000000-0xffffffff] >Oct 29 11:03:00 unused kernel: Normal [mem 0x100000000-0x13fffffff] >Oct 29 11:03:00 unused kernel: Movable zone start for each node >Oct 29 11:03:00 unused kernel: Early memory node ranges >Oct 29 11:03:00 unused kernel: node 0: [mem 0x00001000-0x0009efff] >Oct 29 11:03:00 unused kernel: node 0: [mem 0x00100000-0xbffdffff] >Oct 29 11:03:00 unused kernel: node 0: [mem 0x100000000-0x13fffffff] >Oct 29 11:03:00 unused kernel: ACPI: PM-Timer IO Port: 0x608 >Oct 29 11:03:00 unused kernel: ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled) >Oct 29 11:03:00 unused kernel: ACPI: LAPIC (acpi_id[0x01] lapic_id[0x01] enabled) >Oct 29 11:03:00 unused kernel: ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled) >Oct 29 11:03:00 unused kernel: ACPI: LAPIC (acpi_id[0x03] lapic_id[0x03] enabled) >Oct 29 11:03:00 unused kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) >Oct 29 11:03:00 unused kernel: ACPI: IOAPIC (id[0x00] address[0xfec00000] gsi_base[0]) >Oct 29 11:03:00 unused kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 >Oct 29 11:03:00 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) >Oct 29 11:03:00 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) >Oct 29 11:03:00 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) >Oct 29 11:03:00 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) >Oct 29 11:03:00 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) >Oct 29 11:03:00 unused kernel: Using ACPI (MADT) for SMP configuration information >Oct 29 11:03:00 unused kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs >Oct 29 11:03:00 unused kernel: PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff] >Oct 29 11:03:00 unused kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000effff] >Oct 29 11:03:00 unused kernel: PM: Registered nosave memory: [mem 0x000f0000-0x000fffff] >Oct 29 11:03:00 unused kernel: PM: Registered nosave memory: [mem 0xbffe0000-0xbfffffff] >Oct 29 11:03:00 unused kernel: PM: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] >Oct 29 11:03:00 unused kernel: PM: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] >Oct 29 11:03:00 unused kernel: PM: Registered nosave memory: [mem 0xff000000-0xfffbffff] >Oct 29 11:03:00 unused kernel: PM: Registered nosave memory: [mem 0xfffc0000-0xffffffff] >Oct 29 11:03:00 unused kernel: e820: [mem 0xc0000000-0xfeffbfff] available for PCI devices >Oct 29 11:03:00 unused kernel: Booting paravirtualized kernel on KVM >Oct 29 11:03:00 unused kernel: setup_percpu: NR_CPUS:5120 nr_cpumask_bits:4 nr_cpu_ids:4 nr_node_ids:1 >Oct 29 11:03:00 unused kernel: PERCPU: Embedded 29 pages/cpu @ffff88013fc00000 s86656 r8192 d23936 u524288 >Oct 29 11:03:00 unused kernel: KVM setup async PF for cpu 0 >Oct 29 11:03:00 unused kernel: kvm-stealtime: cpu 0, msr 13fc0e000 >Oct 29 11:03:00 unused kernel: Built 1 zonelists in Node order, mobility grouping on. Total pages: 1032041 >Oct 29 11:03:00 unused kernel: Policy zone: Normal >Oct 29 11:03:00 unused kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-3.10.0-175.el7.x86_64 root=/dev/mapper/rhel_unused-root ro crashkernel=auto rd.lvm.lv=rhel_unused/root rd.lvm.lv=rhel_unused/swap console=tty0 console=ttyS0,115200 LANG=en_US.UTF-8 >Oct 29 11:03:00 unused kernel: PID hash table entries: 4096 (order: 3, 32768 bytes) >Oct 29 11:03:00 unused kernel: xsave: enabled xstate_bv 0x7, cntxt size 0x340 >Oct 29 11:03:00 unused kernel: Checking aperture... >Oct 29 11:03:00 unused kernel: No AGP bridge found >Oct 29 11:03:00 unused kernel: Memory: 3863044k/5242880k available (6216k kernel code, 1049096k absent, 330740k reserved, 4153k data, 1604k init) >Oct 29 11:03:00 unused kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 >Oct 29 11:03:00 unused kernel: Hierarchical RCU implementation. >Oct 29 11:03:00 unused kernel: RCU restricting CPUs from NR_CPUS=5120 to nr_cpu_ids=4. >Oct 29 11:03:00 unused kernel: Experimental no-CBs for all CPUs >Oct 29 11:03:00 unused kernel: Experimental no-CBs CPUs: 0-3. >Oct 29 11:03:00 unused kernel: NR_IRQS:327936 nr_irqs:712 16 >Oct 29 11:03:00 unused kernel: Console: colour VGA+ 80x25 >Oct 29 11:03:00 unused kernel: console [tty0] enabled >Oct 29 11:03:00 unused kernel: console [ttyS0] enabled >Oct 29 11:03:00 unused kernel: allocated 16777216 bytes of page_cgroup >Oct 29 11:03:00 unused kernel: please try 'cgroup_disable=memory' option if you don't want memory cgroups >Oct 29 11:03:00 unused kernel: tsc: Detected 1999.999 MHz processor >Oct 29 11:03:00 unused kernel: Calibrating delay loop (skipped) preset value.. 3999.99 BogoMIPS (lpj=1999999) >Oct 29 11:03:00 unused kernel: pid_max: default: 32768 minimum: 301 >Oct 29 11:03:00 unused kernel: Security Framework initialized >Oct 29 11:03:00 unused kernel: SELinux: Initializing. >Oct 29 11:03:00 unused kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes) >Oct 29 11:03:00 unused kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes) >Oct 29 11:03:00 unused kernel: Mount-cache hash table entries: 4096 >Oct 29 11:03:00 unused kernel: Initializing cgroup subsys memory >Oct 29 11:03:00 unused kernel: Initializing cgroup subsys devices >Oct 29 11:03:00 unused kernel: Initializing cgroup subsys freezer >Oct 29 11:03:00 unused kernel: Initializing cgroup subsys net_cls >Oct 29 11:03:00 unused kernel: Initializing cgroup subsys blkio >Oct 29 11:03:00 unused kernel: Initializing cgroup subsys perf_event >Oct 29 11:03:00 unused kernel: Initializing cgroup subsys hugetlb >Oct 29 11:03:00 unused kernel: CPU: Physical Processor ID: 0 >Oct 29 11:03:00 unused kernel: CPU: Processor Core ID: 0 >Oct 29 11:03:00 unused kernel: mce: CPU supports 10 MCE banks >Oct 29 11:03:00 unused kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 >Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0 >tlb_flushall_shift: 6 >Oct 29 11:03:00 unused kernel: Freeing SMP alternatives: 24k freed >Oct 29 11:03:00 unused kernel: ACPI: Core revision 20130517 >Oct 29 11:03:00 unused kernel: ACPI: All ACPI Tables successfully acquired >Oct 29 11:03:00 unused kernel: ftrace: allocating 23854 entries in 94 pages >Oct 29 11:03:00 unused kernel: Enabling x2apic >Oct 29 11:03:00 unused kernel: Enabled x2apic >Oct 29 11:03:00 unused kernel: Switched APIC routing to physical x2apic. >Oct 29 11:03:00 unused kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 >Oct 29 11:03:00 unused kernel: smpboot: CPU0: Intel Xeon E312xx (Sandy Bridge) (fam: 06, model: 2a, stepping: 01) >Oct 29 11:03:00 unused kernel: Performance Events: unsupported p6 CPU model 42 no PMU driver, software events only. >Oct 29 11:03:00 unused kernel: KVM setup paravirtual spinlock >Oct 29 11:03:00 unused kernel: NMI watchdog: disabled (cpu0): hardware events not enabled >Oct 29 11:03:00 unused kernel: kvm-clock: cpu 1, msr 1:3ff86041, secondary cpu clock >Oct 29 11:03:00 unused kernel: KVM setup async PF for cpu 1 >Oct 29 11:03:00 unused kernel: kvm-stealtime: cpu 1, msr 13fc8e000 >Oct 29 11:03:00 unused kernel: kvm-clock: cpu 2, msr 1:3ff86081, secondary cpu clock >Oct 29 11:03:00 unused kernel: KVM setup async PF for cpu 2 >Oct 29 11:03:00 unused kernel: smpboot: Booting Node 0, Processors #1 #2 #3 OK >Oct 29 11:03:00 unused kernel: kvm-stealtime: cpu 2, msr 13fd0e000 >Oct 29 11:03:00 unused kernel: kvm-clock: cpu 3, msr 1:3ff860c1, secondary cpu clock >Oct 29 11:03:00 unused kernel: Brought up 4 CPUs >Oct 29 11:03:00 unused kernel: KVM setup async PF for cpu 3 >Oct 29 11:03:00 unused kernel: kvm-stealtime: cpu 3, msr 13fd8e000 >Oct 29 11:03:00 unused kernel: smpboot: Total of 4 processors activated (15999.99 BogoMIPS) >Oct 29 11:03:00 unused kernel: devtmpfs: initialized >Oct 29 11:03:00 unused kernel: EVM: security.selinux >Oct 29 11:03:00 unused kernel: EVM: security.ima >Oct 29 11:03:00 unused kernel: EVM: security.capability >Oct 29 11:03:00 unused kernel: atomic64 test passed for x86-64 platform with CX8 and with SSE >Oct 29 11:03:00 unused kernel: NET: Registered protocol family 16 >Oct 29 11:03:00 unused kernel: ACPI: bus type PCI registered >Oct 29 11:03:00 unused kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 >Oct 29 11:03:00 unused kernel: PCI: Using configuration type 1 for base access >Oct 29 11:03:00 unused kernel: ACPI: Added _OSI(Module Device) >Oct 29 11:03:00 unused kernel: ACPI: Added _OSI(Processor Device) >Oct 29 11:03:00 unused kernel: ACPI: Added _OSI(3.0 _SCP Extensions) >Oct 29 11:03:00 unused kernel: ACPI: Added _OSI(Processor Aggregator Device) >Oct 29 11:03:00 unused kernel: ACPI: Interpreter enabled >Oct 29 11:03:00 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S1_] (20130517/hwxface-571) >Oct 29 11:03:00 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S2_] (20130517/hwxface-571) >Oct 29 11:03:00 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S3_] (20130517/hwxface-571) >Oct 29 11:03:00 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S4_] (20130517/hwxface-571) >Oct 29 11:03:00 unused kernel: ACPI: (supports S0 S5) >Oct 29 11:03:00 unused kernel: ACPI: Using IOAPIC for interrupt routing >Oct 29 11:03:00 unused kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug >Oct 29 11:03:00 unused kernel: ACPI: No dock devices found. >Oct 29 11:03:00 unused kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) >Oct 29 11:03:00 unused kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI] >Oct 29 11:03:00 unused kernel: acpi PNP0A03:00: _OSC failed (AE_NOT_FOUND); disabling ASPM >Oct 29 11:03:00 unused kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. >Oct 29 11:03:00 unused kernel: acpiphp: Slot [4] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [5] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [6] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [7] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [8] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [9] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [10] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [11] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [12] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [13] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [14] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [15] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [16] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [17] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [18] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [19] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [20] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [21] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [22] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [23] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [24] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [25] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [26] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [27] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [28] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [29] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [30] registered >Oct 29 11:03:00 unused kernel: acpiphp: Slot [31] registered >Oct 29 11:03:00 unused kernel: PCI host bridge to bus 0000:00 >Oct 29 11:03:00 unused kernel: pci_bus 0000:00: root bus resource [bus 00-ff] >Oct 29 11:03:00 unused kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7] >Oct 29 11:03:00 unused kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xadff] >Oct 29 11:03:00 unused kernel: pci_bus 0000:00: root bus resource [io 0xae0f-0xaeff] >Oct 29 11:03:00 unused kernel: pci_bus 0000:00: root bus resource [io 0xaf20-0xafdf] >Oct 29 11:03:00 unused kernel: pci_bus 0000:00: root bus resource [io 0xafe4-0xffff] >Oct 29 11:03:00 unused kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff] >Oct 29 11:03:00 unused kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff] >Oct 29 11:03:00 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] >Oct 29 11:03:00 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] >Oct 29 11:03:00 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] >Oct 29 11:03:00 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] >Oct 29 11:03:00 unused kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI >Oct 29 11:03:00 unused kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB >Oct 29 11:03:00 unused kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) >Oct 29 11:03:00 unused kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) >Oct 29 11:03:00 unused kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) >Oct 29 11:03:00 unused kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) >Oct 29 11:03:00 unused kernel: ACPI: PCI Interrupt Link [LNKS] (IRQs *9) >Oct 29 11:03:00 unused kernel: ACPI: Enabled 16 GPEs in block 00 to 0F >Oct 29 11:03:00 unused kernel: vgaarb: device added: PCI:0000:00:02.0,decodes=io+mem,owns=io+mem,locks=none >Oct 29 11:03:00 unused kernel: vgaarb: loaded >Oct 29 11:03:00 unused kernel: vgaarb: bridge control possible 0000:00:02.0 >Oct 29 11:03:00 unused kernel: SCSI subsystem initialized >Oct 29 11:03:00 unused kernel: ACPI: bus type USB registered >Oct 29 11:03:00 unused kernel: usbcore: registered new interface driver usbfs >Oct 29 11:03:00 unused kernel: usbcore: registered new interface driver hub >Oct 29 11:03:00 unused kernel: usbcore: registered new device driver usb >Oct 29 11:03:00 unused kernel: PCI: Using ACPI for IRQ routing >Oct 29 11:03:00 unused kernel: NetLabel: Initializing >Oct 29 11:03:00 unused kernel: NetLabel: domain hash size = 128 >Oct 29 11:03:00 unused kernel: NetLabel: protocols = UNLABELED CIPSOv4 >Oct 29 11:03:00 unused kernel: NetLabel: unlabeled traffic allowed by default >Oct 29 11:03:00 unused kernel: Switching to clocksource kvm-clock >Oct 29 11:03:00 unused kernel: pnp: PnP ACPI init >Oct 29 11:03:00 unused kernel: ACPI: bus type PNP registered >Oct 29 11:03:00 unused kernel: pnp: PnP ACPI: found 6 devices >Oct 29 11:03:00 unused kernel: ACPI: bus type PNP unregistered >Oct 29 11:03:00 unused kernel: NET: Registered protocol family 2 >Oct 29 11:03:00 unused kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes) >Oct 29 11:03:00 unused kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes) >Oct 29 11:03:00 unused kernel: TCP: Hash tables configured (established 32768 bind 32768) >Oct 29 11:03:00 unused kernel: TCP: reno registered >Oct 29 11:03:00 unused kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes) >Oct 29 11:03:00 unused kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes) >Oct 29 11:03:00 unused kernel: NET: Registered protocol family 1 >Oct 29 11:03:00 unused kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers >Oct 29 11:03:00 unused kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release >Oct 29 11:03:00 unused kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds >Oct 29 11:03:00 unused kernel: ACPI: PCI Interrupt Link [LNKC] enabled at IRQ 11 >Oct 29 11:03:00 unused kernel: Unpacking initramfs... >Oct 29 11:03:00 unused kernel: Freeing initrd memory: 18292k freed >Oct 29 11:03:00 unused kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) >Oct 29 11:03:00 unused kernel: software IO TLB [mem 0xbbfe0000-0xbffe0000] (64MB) mapped at [ffff8800bbfe0000-ffff8800bffdffff] >Oct 29 11:03:00 unused kernel: RAPL PMU detected, hw unit 2^-0 Joules, API unit is 2^-32 Joules, 3 fixed counters 10737418240 ms ovfl timer >Oct 29 11:03:00 unused kernel: microcode: CPU0 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:03:00 unused kernel: microcode: CPU1 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:03:00 unused kernel: microcode: CPU2 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:03:00 unused kernel: microcode: CPU3 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:03:00 unused kernel: microcode: Microcode Update Driver: v2.00 <tigran@aivazian.fsnet.co.uk>, Peter Oruba >Oct 29 11:03:00 unused kernel: futex hash table entries: 1024 (order: 4, 65536 bytes) >Oct 29 11:03:00 unused kernel: Initialise system trusted keyring >Oct 29 11:03:00 unused kernel: audit: initializing netlink socket (disabled) >Oct 29 11:03:00 unused kernel: type=2000 audit(1414551781.178:1): initialized >Oct 29 11:03:00 unused kernel: HugeTLB registered 2 MB page size, pre-allocated 0 pages >Oct 29 11:03:00 unused kernel: zbud: loaded >Oct 29 11:03:00 unused kernel: VFS: Disk quotas dquot_6.5.2 >Oct 29 11:03:00 unused kernel: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) >Oct 29 11:03:00 unused kernel: msgmni has been set to 7580 >Oct 29 11:03:00 unused kernel: Key type big_key registered >Oct 29 11:03:00 unused kernel: alg: No test for stdrng (krng) >Oct 29 11:03:00 unused kernel: NET: Registered protocol family 38 >Oct 29 11:03:00 unused kernel: Key type asymmetric registered >Oct 29 11:03:00 unused kernel: Asymmetric key parser 'x509' registered >Oct 29 11:03:00 unused kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 252) >Oct 29 11:03:00 unused kernel: io scheduler noop registered >Oct 29 11:03:00 unused kernel: io scheduler deadline registered (default) >Oct 29 11:03:00 unused kernel: io scheduler cfq registered >Oct 29 11:03:00 unused kernel: pci_hotplug: PCI Hot Plug PCI Core version: 0.5 >Oct 29 11:03:00 unused kernel: pciehp: PCI Express Hot Plug Controller Driver version: 0.4 >Oct 29 11:03:00 unused kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 >Oct 29 11:03:00 unused kernel: ACPI: Power Button [PWRF] >Oct 29 11:03:00 unused kernel: GHES: HEST is not enabled! >Oct 29 11:03:00 unused kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled >Oct 29 11:03:00 unused kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A >Oct 29 11:03:00 unused kernel: Non-volatile memory driver v1.3 >Oct 29 11:03:00 unused kernel: Linux agpgart interface v0.103 >Oct 29 11:03:00 unused kernel: crash memory driver: version 1.1 >Oct 29 11:03:00 unused kernel: rdac: device handler registered >Oct 29 11:03:00 unused kernel: hp_sw: device handler registered >Oct 29 11:03:00 unused kernel: emc: device handler registered >Oct 29 11:03:00 unused kernel: alua: device handler registered >Oct 29 11:03:00 unused kernel: libphy: Fixed MDIO Bus: probed >Oct 29 11:03:00 unused kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver >Oct 29 11:03:00 unused kernel: ehci-pci: EHCI PCI platform driver >Oct 29 11:03:00 unused kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver >Oct 29 11:03:00 unused kernel: ohci-pci: OHCI PCI platform driver >Oct 29 11:03:00 unused kernel: uhci_hcd: USB Universal Host Controller Interface driver >Oct 29 11:03:00 unused kernel: uhci_hcd 0000:00:03.0: UHCI Host Controller >Oct 29 11:03:00 unused kernel: uhci_hcd 0000:00:03.0: new USB bus registered, assigned bus number 1 >Oct 29 11:03:00 unused kernel: uhci_hcd 0000:00:03.0: detected 2 ports >Oct 29 11:03:00 unused kernel: uhci_hcd 0000:00:03.0: irq 11, io base 0x0000c0a0 >Oct 29 11:03:00 unused kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001 >Oct 29 11:03:00 unused kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Oct 29 11:03:00 unused kernel: usb usb1: Product: UHCI Host Controller >Oct 29 11:03:00 unused kernel: usb usb1: Manufacturer: Linux 3.10.0-175.el7.x86_64 uhci_hcd >Oct 29 11:03:00 unused kernel: usb usb1: SerialNumber: 0000:00:03.0 >Oct 29 11:03:00 unused kernel: hub 1-0:1.0: USB hub found >Oct 29 11:03:00 unused kernel: hub 1-0:1.0: 2 ports detected >Oct 29 11:03:00 unused kernel: usbcore: registered new interface driver usbserial >Oct 29 11:03:00 unused kernel: usbcore: registered new interface driver usbserial_generic >Oct 29 11:03:00 unused kernel: usbserial: USB Serial support registered for generic >Oct 29 11:03:00 unused kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 >Oct 29 11:03:00 unused kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 >Oct 29 11:03:00 unused kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 >Oct 29 11:03:00 unused kernel: mousedev: PS/2 mouse device common for all mice >Oct 29 11:03:00 unused kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 >Oct 29 11:03:00 unused kernel: rtc_cmos 00:00: RTC can wake from S4 >Oct 29 11:03:00 unused kernel: rtc_cmos 00:00: rtc core: registered rtc_cmos as rtc0 >Oct 29 11:03:00 unused kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram >Oct 29 11:03:00 unused kernel: cpuidle: using governor menu >Oct 29 11:03:00 unused kernel: hidraw: raw HID events driver (C) Jiri Kosina >Oct 29 11:03:00 unused kernel: usbcore: registered new interface driver usbhid >Oct 29 11:03:00 unused kernel: usbhid: USB HID core driver >Oct 29 11:03:00 unused kernel: drop_monitor: Initializing network drop monitor service >Oct 29 11:03:00 unused kernel: TCP: cubic registered >Oct 29 11:03:00 unused kernel: Initializing XFRM netlink socket >Oct 29 11:03:00 unused kernel: NET: Registered protocol family 10 >Oct 29 11:03:00 unused kernel: NET: Registered protocol family 17 >Oct 29 11:03:00 unused kernel: Loading compiled-in X.509 certificates >Oct 29 11:03:00 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' >Oct 29 11:03:00 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' >Oct 29 11:03:00 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: 4304258329ea0da1b80ad429df72c33fe68bdcec' >Oct 29 11:03:00 unused kernel: registered taskstats version 1 >Oct 29 11:03:00 unused kernel: Key type trusted registered >Oct 29 11:03:00 unused kernel: Key type encrypted registered >Oct 29 11:03:00 unused kernel: IMA: No TPM chip found, activating TPM-bypass! >Oct 29 11:03:00 unused kernel: rtc_cmos 00:00: setting system clock to 2014-10-29 03:03:00 UTC (1414551780) >Oct 29 11:03:00 unused kernel: Freeing unused kernel memory: 1604k freed >Oct 29 11:03:00 unused systemd[1]: systemd 208 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ) >Oct 29 11:03:00 unused systemd[1]: Detected virtualization 'kvm'. >Oct 29 11:03:00 unused systemd[1]: Running in initial RAM disk. >Oct 29 11:03:00 unused systemd[1]: Set hostname to <unused>. >Oct 29 11:03:00 unused systemd[1]: Expecting device dev-mapper-rhel_unused\x2droot.device... >Oct 29 11:03:00 unused systemd[1]: Starting -.slice. >Oct 29 11:03:00 unused systemd[1]: Created slice -.slice. >Oct 29 11:03:00 unused systemd[1]: Starting System Slice. >Oct 29 11:03:00 unused systemd[1]: Created slice System Slice. >Oct 29 11:03:00 unused systemd[1]: Starting Slices. >Oct 29 11:03:00 unused systemd[1]: Reached target Slices. >Oct 29 11:03:00 unused systemd[1]: Starting Timers. >Oct 29 11:03:00 unused systemd[1]: Reached target Timers. >Oct 29 11:03:00 unused systemd[1]: Starting Journal Socket. >Oct 29 11:03:00 unused systemd[1]: Listening on Journal Socket. >Oct 29 11:03:00 unused systemd[1]: Started dracut ask for additional cmdline parameters. >Oct 29 11:03:00 unused systemd[1]: Starting dracut cmdline hook... >Oct 29 11:03:00 unused systemd[1]: Started Load Kernel Modules. >Oct 29 11:03:00 unused systemd[1]: Starting Setup Virtual Console... >Oct 29 11:03:00 unused systemd[1]: Starting Journal Service... >Oct 29 11:03:00 unused systemd[1]: Started Journal Service. >Oct 29 11:03:00 unused journal: Journal started >Oct 29 11:03:00 unused systemd: Starting udev Kernel Socket. >Oct 29 11:03:00 unused systemd: Listening on udev Kernel Socket. >Oct 29 11:03:00 unused systemd: Starting udev Control Socket. >Oct 29 11:03:00 unused systemd: Listening on udev Control Socket. >Oct 29 11:03:00 unused systemd: Starting Sockets. >Oct 29 11:03:00 unused systemd: Reached target Sockets. >Oct 29 11:03:00 unused systemd: Starting Create list of required static device nodes for the current kernel... >Oct 29 11:03:00 unused systemd: Starting Apply Kernel Variables... >Oct 29 11:03:00 unused systemd: Starting Swap. >Oct 29 11:03:00 unused systemd: Reached target Swap. >Oct 29 11:03:00 unused systemd: Starting Local File Systems. >Oct 29 11:03:00 unused systemd: Reached target Local File Systems. >Oct 29 11:03:00 unused systemd: Started Apply Kernel Variables. >Oct 29 11:03:00 unused systemd: Started Create list of required static device nodes for the current kernel. >Oct 29 11:03:00 unused systemd: Starting Create static device nodes in /dev... >Oct 29 11:03:00 unused dracut-cmdline: dracut-7.1 (Maipo) dracut-033-224.el7 >Oct 29 11:03:00 unused dracut-cmdline: Using kernel command line parameters: >Oct 29 11:03:00 unused systemd: Started Create static device nodes in /dev. >Oct 29 11:03:00 unused systemd: Started Setup Virtual Console. >Oct 29 11:03:00 unused systemd: Started dracut cmdline hook. >Oct 29 11:03:00 unused systemd: Starting dracut pre-udev hook... >Oct 29 11:03:00 unused kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd >Oct 29 11:03:00 unused kernel: device-mapper: uevent: version 1.0.3 >Oct 29 11:03:00 unused kernel: device-mapper: ioctl: 4.27.0-ioctl (2013-10-30) initialised: dm-devel@redhat.com >Oct 29 11:03:00 unused systemd: Started dracut pre-udev hook. >Oct 29 11:03:00 unused systemd: Starting udev Kernel Device Manager... >Oct 29 11:03:00 unused systemd-udevd[259]: starting version 208 >Oct 29 11:03:00 unused systemd: Started udev Kernel Device Manager. >Oct 29 11:03:00 unused systemd: Started dracut pre-trigger hook. >Oct 29 11:03:00 unused systemd: Starting udev Coldplug all Devices... >Oct 29 11:03:00 unused systemd: Mounting Configuration File System... >Oct 29 11:03:00 unused systemd: Mounted Configuration File System. >Oct 29 11:03:00 unused systemd: Started udev Coldplug all Devices. >Oct 29 11:03:00 unused systemd: Starting dracut initqueue hook... >Oct 29 11:03:00 unused systemd: Starting System Initialization. >Oct 29 11:03:00 unused systemd: Reached target System Initialization. >Oct 29 11:03:00 unused systemd: Starting Show Plymouth Boot Screen... >Oct 29 11:03:00 unused kernel: FDC 0 is a S82078B >Oct 29 11:03:00 unused kernel: [drm] Initialized drm 1.1.0 20060810 >Oct 29 11:03:00 unused kernel: e1000: Intel(R) PRO/1000 Network Driver - version 7.3.21-k8-NAPI >Oct 29 11:03:00 unused kernel: e1000: Copyright (c) 1999-2006 Intel Corporation. >Oct 29 11:03:00 unused kernel: ACPI: bus type ATA registered >Oct 29 11:03:00 unused systemd: Started Show Plymouth Boot Screen. >Oct 29 11:03:00 unused systemd: Started Dispatch Password Requests to Console Directory Watch. >Oct 29 11:03:00 unused systemd: Starting Paths. >Oct 29 11:03:00 unused systemd: Reached target Paths. >Oct 29 11:03:00 unused systemd: Starting Forward Password Requests to Plymouth Directory Watch. >Oct 29 11:03:00 unused systemd: Started Forward Password Requests to Plymouth Directory Watch. >Oct 29 11:03:00 unused systemd: Starting Basic System. >Oct 29 11:03:00 unused systemd: Reached target Basic System. >Oct 29 11:03:00 unused kernel: ACPI: PCI Interrupt Link [LNKD] enabled at IRQ 10 >Oct 29 11:03:00 unused kernel: scsi host0: Virtio SCSI HBA >Oct 29 11:03:00 unused kernel: scsi 0:0:0:0: Direct-Access QEMU QEMU HARDDISK 2.1. PQ: 0 ANSI: 5 >Oct 29 11:03:00 unused kernel: scsi 0:0:1:0: CD-ROM QEMU QEMU CD-ROM 2.1. PQ: 0 ANSI: 5 >Oct 29 11:03:00 unused kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001 >Oct 29 11:03:00 unused kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=5 >Oct 29 11:03:00 unused kernel: usb 1-1: Product: QEMU USB Tablet >Oct 29 11:03:00 unused kernel: usb 1-1: Manufacturer: QEMU >Oct 29 11:03:00 unused kernel: usb 1-1: SerialNumber: 42 >Oct 29 11:03:00 unused kernel: ACPI: PCI Interrupt Link [LNKA] enabled at IRQ 10 >Oct 29 11:03:00 unused kernel: sr 0:0:1:0: [sr0] scsi3-mmc drive: 16x/50x cd/rw xa/form2 cdda tray >Oct 29 11:03:00 unused kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 >Oct 29 11:03:00 unused kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:03.0/usb1/1-1/1-1:1.0/input/input2 >Oct 29 11:03:00 unused kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Pointer [QEMU QEMU USB Tablet] on usb-0000:00:03.0-1/input0 >Oct 29 11:03:00 unused kernel: sd 0:0:0:0: [sda] 41943040 512-byte logical blocks: (21.4 GB/20.0 GiB) >Oct 29 11:03:00 unused kernel: sd 0:0:0:0: [sda] Write Protect is off >Oct 29 11:03:00 unused kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA >Oct 29 11:03:00 unused kernel: sda: sda1 sda2 >Oct 29 11:03:00 unused kernel: sd 0:0:0:0: [sda] Attached SCSI disk >Oct 29 11:03:01 unused kernel: e1000 0000:00:05.0 eth0: (PCI:33MHz:32-bit) 9a:4e:4f:50:51:52 >Oct 29 11:03:01 unused kernel: e1000 0000:00:05.0 eth0: Intel(R) PRO/1000 Network Connection >Oct 29 11:03:01 unused kernel: ACPI: PCI Interrupt Link [LNKB] enabled at IRQ 11 >Oct 29 11:03:01 unused kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 >Oct 29 11:03:01 unused kernel: tsc: Refined TSC clocksource calibration: 2000.001 MHz >Oct 29 11:03:01 unused kernel: [drm] Device Version 0.0 >Oct 29 11:03:01 unused kernel: [drm] Compression level 0 log level 0 >Oct 29 11:03:01 unused kernel: [drm] Currently using mode #0, list at 0x488 >Oct 29 11:03:01 unused kernel: [drm] 12286 io pages at offset 0x1000000 >Oct 29 11:03:01 unused kernel: [drm] 16777216 byte draw area at offset 0x0 >Oct 29 11:03:01 unused kernel: [drm] RAM header offset: 0x3ffe000 >Oct 29 11:03:01 unused kernel: [drm] rom modes offset 0x488 for 128 modes >Oct 29 11:03:01 unused kernel: [TTM] Zone kernel: Available graphics memory: 1941482 kiB >Oct 29 11:03:01 unused kernel: [TTM] Initializing pool allocator >Oct 29 11:03:01 unused systemd-udevd[263]: renamed network interface eth0 to ens5 >Oct 29 11:03:01 unused kernel: [TTM] Initializing DMA pool allocator >Oct 29 11:03:01 unused kernel: [drm] qxl: 16M of VRAM memory size >Oct 29 11:03:01 unused kernel: [drm] qxl: 63M of IO pages memory ready (VRAM domain) >Oct 29 11:03:01 unused kernel: [drm] qxl: 32M of Surface memory size >Oct 29 11:03:01 unused kernel: [drm] main mem slot 1 [f8000000,3ffe000] >Oct 29 11:03:01 unused kernel: [drm] surface mem slot 2 [fc000000,2000000] >Oct 29 11:03:01 unused kernel: [drm] fb mappable at 0xF8000000, size 3145728 >Oct 29 11:03:01 unused kernel: [drm] fb: depth 24, pitch 4096, width 1024, height 768 >Oct 29 11:03:01 unused kernel: fbcon: qxldrmfb (fb0) is primary device >Oct 29 11:03:01 unused kernel: Console: switching to colour frame buffer device 128x48 >Oct 29 11:03:01 unused kernel: qxl 0000:00:02.0: fb0: qxldrmfb frame buffer device >Oct 29 11:03:01 unused kernel: qxl 0000:00:02.0: registered panic notifier >Oct 29 11:03:01 unused kernel: [drm] Initialized qxl 0.1.0 20120117 for 0000:00:02.0 on minor 0 >Oct 29 11:03:01 unused kernel: scsi host1: ata_piix >Oct 29 11:03:01 unused kernel: scsi host2: ata_piix >Oct 29 11:03:01 unused kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 >Oct 29 11:03:01 unused kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 >Oct 29 11:03:01 unused dracut-initqueue: Scanning devices sda2 for LVM logical volumes rhel_unused/root rhel_unused/swap >Oct 29 11:03:01 unused dracut-initqueue: inactive '/dev/rhel_unused/swap' [2.00 GiB] inherit >Oct 29 11:03:01 unused dracut-initqueue: inactive '/dev/rhel_unused/root' [17.47 GiB] inherit >Oct 29 11:03:01 unused systemd: Found device /dev/mapper/rhel_unused-root. >Oct 29 11:03:01 unused systemd: Starting File System Check on /dev/mapper/rhel_unused-root... >Oct 29 11:03:01 unused systemd-fsck: /sbin/fsck.xfs: XFS file system. >Oct 29 11:03:01 unused systemd: Started File System Check on /dev/mapper/rhel_unused-root. >Oct 29 11:03:01 unused systemd: Started dracut initqueue hook. >Oct 29 11:03:01 unused systemd: Started dracut pre-mount hook. >Oct 29 11:03:01 unused systemd: Mounting /sysroot... >Oct 29 11:03:01 unused systemd: Starting Remote File Systems (Pre). >Oct 29 11:03:01 unused systemd: Reached target Remote File Systems (Pre). >Oct 29 11:03:01 unused systemd: Starting Remote File Systems. >Oct 29 11:03:01 unused systemd: Reached target Remote File Systems. >Oct 29 11:03:01 unused kernel: SGI XFS with ACLs, security attributes, large block/inode numbers, no debug enabled >Oct 29 11:03:01 unused kernel: XFS (dm-0): Mounting Filesystem >Oct 29 11:03:14 unused kernel: XFS (dm-0): Ending clean mount >Oct 29 11:03:14 unused systemd: Mounted /sysroot. >Oct 29 11:03:14 unused systemd: Starting Initrd Root File System. >Oct 29 11:03:14 unused systemd: Reached target Initrd Root File System. >Oct 29 11:03:14 unused systemd: Starting Reload Configuration from the Real Root... >Oct 29 11:03:14 unused systemd: Reloading. >Oct 29 11:03:14 unused systemd: Started Reload Configuration from the Real Root. >Oct 29 11:03:14 unused systemd: Starting Initrd File Systems. >Oct 29 11:03:14 unused systemd: Reached target Initrd File Systems. >Oct 29 11:03:14 unused systemd: Started dracut mount hook. >Oct 29 11:03:14 unused systemd: Starting Initrd Default Target. >Oct 29 11:03:14 unused systemd: Reached target Initrd Default Target. >Oct 29 11:03:14 unused systemd: Starting dracut pre-pivot and cleanup hook... >Oct 29 11:03:14 unused systemd: Started dracut pre-pivot and cleanup hook. >Oct 29 11:03:14 unused systemd: Starting Cleaning Up and Shutting Down Daemons... >Oct 29 11:03:14 unused systemd: Stopping Cleaning Up and Shutting Down Daemons... >Oct 29 11:03:14 unused systemd: Starting Plymouth switch root service... >Oct 29 11:03:14 unused systemd: Stopped Cleaning Up and Shutting Down Daemons. >Oct 29 11:03:14 unused systemd: Stopping dracut pre-pivot and cleanup hook... >Oct 29 11:03:14 unused systemd: Stopped dracut pre-pivot and cleanup hook. >Oct 29 11:03:14 unused systemd: Stopping Remote File Systems. >Oct 29 11:03:14 unused systemd: Stopped target Remote File Systems. >Oct 29 11:03:14 unused systemd: Stopping Remote File Systems (Pre). >Oct 29 11:03:14 unused systemd: Stopped target Remote File Systems (Pre). >Oct 29 11:03:14 unused systemd: Stopping dracut initqueue hook... >Oct 29 11:03:14 unused systemd: Stopped dracut initqueue hook. >Oct 29 11:03:14 unused systemd: Stopping Initrd Default Target. >Oct 29 11:03:14 unused systemd: Stopped target Initrd Default Target. >Oct 29 11:03:14 unused systemd: Stopping Basic System. >Oct 29 11:03:14 unused systemd: Stopped target Basic System. >Oct 29 11:03:14 unused systemd: Stopping Slices. >Oct 29 11:03:14 unused systemd: Stopped target Slices. >Oct 29 11:03:14 unused systemd: Stopping Paths. >Oct 29 11:03:14 unused systemd: Stopped target Paths. >Oct 29 11:03:14 unused systemd: Stopping Timers. >Oct 29 11:03:14 unused systemd: Stopped target Timers. >Oct 29 11:03:14 unused systemd: Stopping Sockets. >Oct 29 11:03:14 unused systemd: Stopped target Sockets. >Oct 29 11:03:14 unused systemd: Stopping System Initialization. >Oct 29 11:03:14 unused systemd: Stopped target System Initialization. >Oct 29 11:03:14 unused systemd: Stopping Apply Kernel Variables... >Oct 29 11:03:14 unused systemd: Stopped Apply Kernel Variables. >Oct 29 11:03:14 unused systemd: Stopping udev Coldplug all Devices... >Oct 29 11:03:14 unused systemd: Stopped udev Coldplug all Devices. >Oct 29 11:03:14 unused systemd: Stopping Swap. >Oct 29 11:03:14 unused systemd: Stopped target Swap. >Oct 29 11:03:14 unused systemd: Stopping Local File Systems. >Oct 29 11:03:14 unused systemd: Stopped target Local File Systems. >Oct 29 11:03:14 unused systemd: Stopping udev Kernel Device Manager... >Oct 29 11:03:14 unused systemd: Stopped udev Kernel Device Manager. >Oct 29 11:03:14 unused systemd: Stopping dracut pre-udev hook... >Oct 29 11:03:14 unused systemd: Stopped dracut pre-udev hook. >Oct 29 11:03:14 unused systemd: Stopping dracut cmdline hook... >Oct 29 11:03:14 unused systemd: Stopped dracut cmdline hook. >Oct 29 11:03:14 unused systemd: Stopping Create static device nodes in /dev... >Oct 29 11:03:14 unused systemd: Stopped Create static device nodes in /dev. >Oct 29 11:03:14 unused systemd: Stopping Create list of required static device nodes for the current kernel... >Oct 29 11:03:14 unused systemd: Stopped Create list of required static device nodes for the current kernel. >Oct 29 11:03:14 unused systemd: Stopping udev Kernel Socket. >Oct 29 11:03:14 unused systemd: Closed udev Kernel Socket. >Oct 29 11:03:14 unused systemd: Stopping udev Control Socket. >Oct 29 11:03:14 unused systemd: Closed udev Control Socket. >Oct 29 11:03:14 unused systemd: Starting Cleanup udevd DB... >Oct 29 11:03:14 unused systemd: Started Cleanup udevd DB. >Oct 29 11:03:14 unused systemd: Starting Switch Root. >Oct 29 11:03:14 unused systemd: Reached target Switch Root. >Oct 29 11:03:14 unused systemd: Started Plymouth switch root service. >Oct 29 11:03:14 unused systemd: Starting Switch Root... >Oct 29 11:03:14 unused systemd: Switching root. >Oct 29 11:03:14 unused journal: Journal stopped >Oct 29 11:03:20 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:03:20 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:03:20 unused systemd-journald[110]: Received SIGTERM >Oct 29 11:03:20 unused systemd-cgroups-agent[464]: Failed to get D-Bus connection: Unknown error -1 >Oct 29 11:03:20 unused kernel: type=1404 audit(1414551794.908:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 >Oct 29 11:03:20 unused kernel: type=1403 audit(1414551795.141:3): policy loaded auid=4294967295 ses=4294967295 >Oct 29 11:03:20 unused systemd[1]: Successfully loaded SELinux policy in 257.953ms. >Oct 29 11:03:20 unused systemd[1]: Relabelled /dev and /run in 20.740ms. >Oct 29 11:03:20 unused journal: Journal started >Oct 29 11:03:20 unused systemd: systemd 208 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ) >Oct 29 11:03:20 unused systemd: Detected virtualization 'kvm'. >Oct 29 11:03:20 unused systemd: Set hostname to <unused>. >Oct 29 11:03:20 unused systemd: /usr/lib/systemd/system-generators/anaconda-generator exited with exit status 1. >Oct 29 11:03:20 unused systemd: [/usr/lib/systemd/system/lvm2-lvmetad.socket:9] Unknown lvalue 'RemoveOnStop' in section 'Socket' >Oct 29 11:03:20 unused systemd: [/usr/lib/systemd/system/dm-event.socket:10] Unknown lvalue 'RemoveOnStop' in section 'Socket' >Oct 29 11:03:20 unused systemd: Started udev Coldplug all Devices. >Oct 29 11:03:20 unused systemd: Starting udev Wait for Complete Device Initialization... >Oct 29 11:03:20 unused systemd: Starting LVM2 metadata daemon... >Oct 29 11:03:20 unused systemd: Started LVM2 metadata daemon. >Oct 29 11:03:20 unused systemd: Started Load/Save Random Seed. >Oct 29 11:03:20 unused systemd: Started Import network configuration from initramfs. >Oct 29 11:03:20 unused lvm: 2 logical volume(s) in volume group "rhel_unused" monitored >Oct 29 11:03:20 unused systemd: Started Configure read-only root support. >Oct 29 11:03:20 unused systemd: Started Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. >Oct 29 11:03:20 unused systemd: Started Create static device nodes in /dev. >Oct 29 11:03:20 unused systemd: Starting udev Kernel Device Manager... >Oct 29 11:03:20 unused systemd: Starting Local File Systems (Pre). >Oct 29 11:03:20 unused systemd: Reached target Local File Systems (Pre). >Oct 29 11:03:20 unused systemd-udevd[533]: starting version 208 >Oct 29 11:03:20 unused systemd: Started udev Kernel Device Manager. >Oct 29 11:03:21 unused systemd: Started udev Wait for Complete Device Initialization. >Oct 29 11:03:21 unused systemd: Starting Activation of DM RAID sets... >Oct 29 11:03:21 unused systemd: Found device /dev/ttyS0. >Oct 29 11:03:21 unused kernel: input: PC Speaker as /devices/platform/pcspkr/input/input4 >Oct 29 11:03:21 unused kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 >Oct 29 11:03:21 unused kernel: ppdev: user-space parallel port driver >Oct 29 11:03:21 unused systemd: Started Activation of DM RAID sets. >Oct 29 11:03:21 unused systemd: Starting Encrypted Volumes. >Oct 29 11:03:21 unused kernel: alg: No test for __gcm-aes-aesni (__driver-gcm-aes-aesni) >Oct 29 11:03:21 unused kernel: alg: No test for crc32 (crc32-pclmul) >Oct 29 11:03:21 unused mtp-probe: checking bus 1, device 2: "/sys/devices/pci0000:00/0000:00:03.0/usb1/1-1" >Oct 29 11:03:21 unused mtp-probe: bus: 1, device: 2 was not an MTP device >Oct 29 11:03:22 unused systemd: Reached target Encrypted Volumes. >Oct 29 11:03:22 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 29 11:03:22 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 29 11:03:22 unused systemd: Starting LVM2 PV scan on device 8:2... >Oct 29 11:03:22 unused systemd: Found device /dev/mapper/rhel_unused-swap. >Oct 29 11:03:22 unused systemd: Activating swap /dev/mapper/rhel_unused-swap... >Oct 29 11:03:22 unused systemd: Found device QEMU_HARDDISK. >Oct 29 11:03:22 unused systemd: Mounting /boot... >Oct 29 11:03:22 unused lvm: 2 logical volume(s) in volume group "rhel_unused" now active >Oct 29 11:03:22 unused systemd: Started LVM2 PV scan on device 8:2. >Oct 29 11:03:22 unused kernel: Adding 2097148k swap on /dev/mapper/rhel_unused-swap. Priority:-1 extents:1 across:2097148k FS >Oct 29 11:03:22 unused kernel: XFS (sda1): Mounting Filesystem >Oct 29 11:03:22 unused systemd: Activated swap /dev/mapper/rhel_unused-swap. >Oct 29 11:03:22 unused systemd: Starting Swap. >Oct 29 11:03:22 unused systemd: Reached target Swap. >Oct 29 11:03:29 unused kernel: XFS (sda1): Ending clean mount >Oct 29 11:03:29 unused systemd: Mounted /boot. >Oct 29 11:03:29 unused systemd: Starting Local File Systems. >Oct 29 11:03:29 unused systemd: Reached target Local File Systems. >Oct 29 11:03:29 unused systemd: Started Mark the need to relabel after reboot. >Oct 29 11:03:29 unused systemd: Started Relabel all filesystems, if necessary. >Oct 29 11:03:29 unused systemd: Started Reconfigure the system on administrator request. >Oct 29 11:03:29 unused systemd: Starting Create Volatile Files and Directories... >Oct 29 11:03:29 unused systemd: Starting Tell Plymouth To Write Out Runtime Data... >Oct 29 11:03:29 unused systemd: Started Create Volatile Files and Directories. >Oct 29 11:03:29 unused systemd: Starting Security Auditing Service... >Oct 29 11:03:30 unused systemd: Started Tell Plymouth To Write Out Runtime Data. >Oct 29 11:03:30 unused auditd[618]: Started dispatcher: /sbin/audispd pid: 630 >Oct 29 11:03:30 unused augenrules: /sbin/augenrules: No change >Oct 29 11:03:30 unused kernel: type=1305 audit(1414551810.219:4): audit_pid=618 old=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 >Oct 29 11:03:30 unused audispd: audispd initialized with q_depth=150 and 1 active plugins >Oct 29 11:03:30 unused auditd[618]: Init complete, auditd 2.4 listening for events (startup state enable) >Oct 29 11:03:30 unused augenrules: No rules >Oct 29 11:03:30 unused augenrules: enabled 1 >Oct 29 11:03:30 unused augenrules: flag 1 >Oct 29 11:03:30 unused augenrules: pid 618 >Oct 29 11:03:30 unused augenrules: rate_limit 0 >Oct 29 11:03:30 unused augenrules: backlog_limit 320 >Oct 29 11:03:30 unused augenrules: lost 0 >Oct 29 11:03:30 unused augenrules: backlog 1 >Oct 29 11:03:30 unused systemd: Started Security Auditing Service. >Oct 29 11:03:30 unused systemd: Starting Update UTMP about System Reboot/Shutdown... >Oct 29 11:03:30 unused systemd: Started Update UTMP about System Reboot/Shutdown. >Oct 29 11:03:30 unused systemd: Starting System Initialization. >Oct 29 11:03:30 unused systemd: Reached target System Initialization. >Oct 29 11:03:30 unused systemd: Starting Daily Cleanup of Temporary Directories. >Oct 29 11:03:30 unused systemd: Started Daily Cleanup of Temporary Directories. >Oct 29 11:03:30 unused systemd: Starting Timers. >Oct 29 11:03:30 unused systemd: Reached target Timers. >Oct 29 11:03:30 unused systemd: Starting Open-iSCSI iscsid Socket. >Oct 29 11:03:30 unused systemd: Listening on Open-iSCSI iscsid Socket. >Oct 29 11:03:30 unused systemd: Starting Open-iSCSI iscsiuio Socket. >Oct 29 11:03:30 unused systemd: Listening on Open-iSCSI iscsiuio Socket. >Oct 29 11:03:30 unused systemd: Starting RPCbind Server Activation Socket. >Oct 29 11:03:30 unused systemd: Listening on RPCbind Server Activation Socket. >Oct 29 11:03:30 unused systemd: Starting Avahi mDNS/DNS-SD Stack Activation Socket. >Oct 29 11:03:30 unused systemd: Listening on Avahi mDNS/DNS-SD Stack Activation Socket. >Oct 29 11:03:30 unused systemd: Starting Flexible branding. >Oct 29 11:03:30 unused systemd: Started Flexible branding. >Oct 29 11:03:30 unused systemd: Starting Paths. >Oct 29 11:03:30 unused systemd: Reached target Paths. >Oct 29 11:03:30 unused systemd: Starting D-Bus System Message Bus Socket. >Oct 29 11:03:30 unused systemd: Listening on D-Bus System Message Bus Socket. >Oct 29 11:03:30 unused systemd: Starting Sockets. >Oct 29 11:03:30 unused systemd: Reached target Sockets. >Oct 29 11:03:30 unused systemd: Starting Basic System. >Oct 29 11:03:30 unused systemd: Reached target Basic System. >Oct 29 11:03:30 unused systemd: Starting firewalld - dynamic firewall daemon... >Oct 29 11:03:30 unused systemd: Started Load CPU microcode update. >Oct 29 11:03:30 unused systemd: Starting Dump dmesg to /var/log/dmesg... >Oct 29 11:03:30 unused systemd: Started Software RAID monitoring and management. >Oct 29 11:03:30 unused systemd: Starting libstoragemgmt plug-in server daemon... >Oct 29 11:03:30 unused systemd: Started libstoragemgmt plug-in server daemon. >Oct 29 11:03:30 unused systemd: Starting Avahi mDNS/DNS-SD Stack... >Oct 29 11:03:30 unused systemd: Starting NTP client/server... >Oct 29 11:03:30 unused systemd: Starting Kernel Samepage Merging... >Oct 29 11:03:30 unused systemd: Starting Rollback uncommitted netcf network config change transactions... >Oct 29 11:03:30 unused systemd: Starting System Logging Service... >Oct 29 11:03:31 unused netcf-transaction.sh: Running start: No pending transaction to rollback >Oct 29 11:03:31 unused systemd: Starting Resets System Activity Logs... >Oct 29 11:03:31 unused systemd: Starting Self Monitoring and Reporting Technology (SMART) Daemon... >Oct 29 11:03:31 unused systemd: Started Self Monitoring and Reporting Technology (SMART) Daemon. >Oct 29 11:03:31 unused systemd: Starting Dynamic System Tuning Daemon... >Oct 29 11:03:31 unused systemd: Starting Hardware RNG Entropy Gatherer Daemon... >Oct 29 11:03:31 unused systemd: Started Hardware RNG Entropy Gatherer Daemon. >Oct 29 11:03:31 unused systemd: Started OpenSSH Server Key Generation. >Oct 29 11:03:31 unused systemd: Starting irqbalance daemon... >Oct 29 11:03:31 unused rngd: Unable to open file: /dev/tpm0 >Oct 29 11:03:31 unused rngd: can't open any entropy source >Oct 29 11:03:31 unused rngd: Maybe RNG device modules are not loaded >Oct 29 11:03:31 unused systemd: Started irqbalance daemon. >Oct 29 11:03:31 unused systemd: Starting Login Service... >Oct 29 11:03:31 unused systemd: Starting Accounts Service... >Oct 29 11:03:31 unused avahi-daemon[646]: Found user 'avahi' (UID 70) and group 'avahi' (GID 70). >Oct 29 11:03:31 unused avahi-daemon[646]: Successfully dropped root privileges. >Oct 29 11:03:31 unused avahi-daemon[646]: avahi-daemon 0.6.31 starting up. >Oct 29 11:03:31 unused avahi-daemon[646]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns! >Oct 29 11:03:31 unused systemd: Starting RealtimeKit Scheduling Policy Service... >Oct 29 11:03:32 unused chronyd[669]: chronyd version 1.29.1 starting >Oct 29 11:03:32 unused chronyd[669]: Linux kernel major=3 minor=10 patch=0 >Oct 29 11:03:32 unused chronyd[669]: hz=100 shift_hz=7 freq_scale=1.00000000 nominal_tick=10000 slew_delta_tick=833 max_tick_bias=1000 shift_pll=2 >Oct 29 11:03:32 unused smartd[656]: smartd 6.2 2013-07-26 r3841 [x86_64-linux-3.10.0-175.el7.x86_64] (local build) >Oct 29 11:03:32 unused smartd[656]: Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org >Oct 29 11:03:32 unused smartd[656]: Opened configuration file /etc/smartmontools/smartd.conf >Oct 29 11:03:32 unused smartd[656]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices >Oct 29 11:03:32 unused smartd[656]: Device: /dev/sda, opened >Oct 29 11:03:32 unused smartd[656]: Device: /dev/sda, [QEMU QEMU HARDDISK 2.1.], 21.4 GB >Oct 29 11:03:32 unused smartd[656]: Device: /dev/sda, Bad IEC (SMART) mode page, err=5, skip device >Oct 29 11:03:32 unused smartd[656]: Monitoring 0 ATA and 0 SCSI devices >Oct 29 11:03:32 unused chronyd[669]: Frequency -3.125 +/- 30.153 ppm read from /var/lib/chrony/drift >Oct 29 11:03:33 unused systemd: Starting D-Bus System Message Bus... >Oct 29 11:03:33 unused systemd: Started D-Bus System Message Bus. >Oct 29 11:03:33 unused systemd: Started Dump dmesg to /var/log/dmesg. >Oct 29 11:03:33 unused systemd: Started Kernel Samepage Merging. >Oct 29 11:03:33 unused systemd: Started Rollback uncommitted netcf network config change transactions. >Oct 29 11:03:33 unused systemd: Started Resets System Activity Logs. >Oct 29 11:03:33 unused systemd: rngd.service: main process exited, code=exited, status=1/FAILURE >Oct 29 11:03:33 unused systemd: Unit rngd.service entered failed state. >Oct 29 11:03:33 unused systemd: Starting Kernel Samepage Merging (KSM) Tuning Daemon... >Oct 29 11:03:33 unused systemd: Started System Logging Service. >Oct 29 11:03:33 unused systemd: Started Kernel Samepage Merging (KSM) Tuning Daemon. >Oct 29 11:03:34 unused systemd: Started NTP client/server. >Oct 29 11:03:35 unused dbus-daemon: dbus[672]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:03:35 unused dbus[672]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:03:35 unused avahi-daemon[646]: Successfully called chroot(). >Oct 29 11:03:35 unused avahi-daemon[646]: Successfully dropped remaining capabilities. >Oct 29 11:03:35 unused avahi-daemon[646]: No service file found in /etc/avahi/services. >Oct 29 11:03:35 unused systemd: Started Avahi mDNS/DNS-SD Stack. >Oct 29 11:03:35 unused systemd: Started RealtimeKit Scheduling Policy Service. >Oct 29 11:03:35 unused systemd-logind: New seat seat0. >Oct 29 11:03:35 unused avahi-daemon[646]: Network interface enumeration completed. >Oct 29 11:03:35 unused avahi-daemon[646]: Registering HINFO record with values 'X86_64'/'LINUX'. >Oct 29 11:03:35 unused avahi-daemon[646]: Server startup complete. Host name is unused.local. Local service cookie is 2791928633. >Oct 29 11:03:35 unused systemd: Started Login Service. >Oct 29 11:03:35 unused systemd-logind: Watching system buttons on /dev/input/event0 (Power Button) >Oct 29 11:03:35 unused dbus-daemon: dbus[672]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Oct 29 11:03:35 unused dbus[672]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Oct 29 11:03:35 unused systemd: Starting Authorization Manager... >Oct 29 11:03:36 unused polkitd[710]: Started polkitd version 0.112 >Oct 29 11:03:36 unused dbus-daemon: dbus[672]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Oct 29 11:03:36 unused dbus[672]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Oct 29 11:03:36 unused systemd: Started Authorization Manager. >Oct 29 11:03:36 unused accounts-daemon[666]: started daemon version 0.6.35 >Oct 29 11:03:36 unused systemd: Started Accounts Service. >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused kernel: ip_tables: (C) 2000-2006 Netfilter Core Team >Oct 29 11:03:37 unused systemd: Started Dynamic System Tuning Daemon. >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused kernel: nf_conntrack version 0.5.0 (16384 buckets, 65536 max) >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:37 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused kernel: Ebtables v2.0 registered >Oct 29 11:03:38 unused kernel: Bridge firewalling registered >Oct 29 11:03:38 unused systemd: Started firewalld - dynamic firewall daemon. >Oct 29 11:03:38 unused systemd: Starting Network Manager... >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:38 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused NetworkManager[792]: <info> NetworkManager (version 0.9.9.1-42.git20140326.4dba720.el7) is starting... >Oct 29 11:03:39 unused NetworkManager[792]: <info> Read config: /etc/NetworkManager/NetworkManager.conf and conf.d: 10-ibft-plugin.conf, 00-server.conf >Oct 29 11:03:39 unused NetworkManager[792]: <info> WEXT support is disabled >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused NetworkManager[792]: <info> VPN: loaded org.freedesktop.NetworkManager.libreswan >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused NetworkManager[792]: ifcfg-rh: Acquired D-Bus service com.redhat.ifcfgrh1 >Oct 29 11:03:39 unused NetworkManager[792]: <info> Loaded plugin ifcfg-rh: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused NetworkManager[792]: <info> Loaded plugin iBFT: (c) 2014 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 11:03:39 unused NetworkManager[792]: <info> Loaded plugin keyfile: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused NetworkManager[792]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:03:39 unused NetworkManager[792]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-ens5 ... >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused NetworkManager[792]: ifcfg-rh: read connection 'ens5' >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused NetworkManager[792]: <info> monitoring kernel firmware directory '/lib/firmware'. >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused NetworkManager[792]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-adsl.so >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused NetworkManager[792]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-bluetooth.so >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused NetworkManager[792]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-wwan.so >Oct 29 11:03:39 unused NetworkManager[792]: <info> WiFi enabled by radio killswitch; enabled by state file >Oct 29 11:03:39 unused NetworkManager[792]: <info> WWAN enabled by radio killswitch; enabled by state file >Oct 29 11:03:39 unused NetworkManager[792]: <info> WiMAX enabled by radio killswitch; enabled by state file >Oct 29 11:03:39 unused NetworkManager[792]: <info> Networking is enabled by state file >Oct 29 11:03:39 unused systemd: Started Network Manager. >Oct 29 11:03:39 unused systemd: Starting LSB: Bring up/down networking... >Oct 29 11:03:39 unused NetworkManager[792]: <info> (lo): link connected >Oct 29 11:03:39 unused NetworkManager[792]: <info> (lo): carrier is ON (but ignored) >Oct 29 11:03:39 unused NetworkManager[792]: <info> (lo): new Generic device (driver: 'unknown' ifindex: 1) >Oct 29 11:03:39 unused NetworkManager[792]: <info> (lo): exported as /org/freedesktop/NetworkManager/Devices/0 >Oct 29 11:03:39 unused NetworkManager[792]: <info> (ens5): carrier is OFF (but ignored) >Oct 29 11:03:39 unused NetworkManager[792]: <info> (ens5): new Ethernet device (driver: 'e1000' ifindex: 2) >Oct 29 11:03:39 unused NetworkManager[792]: <info> (ens5): exported as /org/freedesktop/NetworkManager/Devices/1 >Oct 29 11:03:39 unused NetworkManager[792]: <info> (ens5): device state change: unmanaged -> unavailable (reason 'managed') [10 20 2] >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused NetworkManager[792]: <info> (ens5): preparing device >Oct 29 11:03:39 unused NetworkManager[792]: <info> (ens5): device state change: unavailable -> disconnected (reason 'none') [20 30 0] >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused kernel: IPv6: ADDRCONF(NETDEV_UP): ens5: link is not ready >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused dbus-daemon: dbus[672]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:03:39 unused dbus[672]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:39 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused NetworkManager[792]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:03:40 unused network: Bringing up loopback interface: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused NetworkManager[792]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:03:40 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused NetworkManager[792]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:03:40 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused NetworkManager[792]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:03:40 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused network: [ OK ] >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused NetworkManager[792]: <warn> Failed to activate 'ens5': Connection 'ens5' is not available on the device ens5 at this time. >Oct 29 11:03:40 unused NetworkManager[792]: <info> NetworkManager state is now DISCONNECTING >Oct 29 11:03:40 unused NetworkManager[792]: <info> NetworkManager state is now DISCONNECTED >Oct 29 11:03:40 unused network: Bringing up interface ens5: Error: Connection activation failed: Connection 'ens5' is not available on the device ens5 at this time. >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused network: [FAILED] >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused systemd: network.service: control process exited, code=exited status=1 >Oct 29 11:03:40 unused systemd: Failed to start LSB: Bring up/down networking. >Oct 29 11:03:40 unused systemd: Unit network.service entered failed state. >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused systemd: Starting Network. >Oct 29 11:03:40 unused systemd: Reached target Network. >Oct 29 11:03:40 unused systemd: Started Login and scanning of iSCSI devices. >Oct 29 11:03:40 unused systemd: Starting Remote File Systems (Pre). >Oct 29 11:03:40 unused systemd: Reached target Remote File Systems (Pre). >Oct 29 11:03:40 unused systemd: Starting Remote File Systems. >Oct 29 11:03:40 unused systemd: Reached target Remote File Systems. >Oct 29 11:03:40 unused systemd: Starting Trigger Flushing of Journal to Persistent Storage... >Oct 29 11:03:40 unused systemd: Starting Virtualization daemon... >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused systemd: Starting Enable periodic update of entitlement certificates.... >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused systemd: Starting Crash recovery kernel arming... >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:40 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused systemd: Starting Postfix Mail Transport Agent... >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused systemd: Starting OpenSSH server daemon... >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused systemd: Started OpenSSH server daemon. >Oct 29 11:03:41 unused systemd: Starting /etc/rc.d/rc.local Compatibility... >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused systemd: Starting LSB: Starts the Spacewalk Daemon... >Oct 29 11:03:41 unused systemd: Started Enable periodic update of entitlement certificates.. >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:03:41 unused kernel: e1000: ens5 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX >Oct 29 11:03:41 unused systemd: Started Trigger Flushing of Journal to Persistent Storage. >Oct 29 11:03:41 unused systemd: Starting Permit User Sessions... >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused NetworkManager[792]: <info> (ens5): link connected >Oct 29 11:03:41 unused NetworkManager[792]: <info> Auto-activating connection 'ens5'. >Oct 29 11:03:41 unused NetworkManager[792]: <info> Activation (ens5) starting connection 'ens5' >Oct 29 11:03:41 unused NetworkManager[792]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) scheduled... >Oct 29 11:03:41 unused NetworkManager[792]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) started... >Oct 29 11:03:41 unused NetworkManager[792]: <info> (ens5): device state change: disconnected -> prepare (reason 'none') [30 40 0] >Oct 29 11:03:41 unused NetworkManager[792]: <info> NetworkManager state is now CONNECTING >Oct 29 11:03:41 unused NetworkManager[792]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) scheduled... >Oct 29 11:03:41 unused NetworkManager[792]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) complete. >Oct 29 11:03:41 unused NetworkManager[792]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) starting... >Oct 29 11:03:41 unused NetworkManager[792]: <info> (ens5): device state change: prepare -> config (reason 'none') [40 50 0] >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused NetworkManager[792]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) successful. >Oct 29 11:03:41 unused NetworkManager[792]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) complete. >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens5: link becomes ready >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused rc.local: ens5: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 >Oct 29 11:03:41 unused rc.local: ether 9a:4e:4f:50:51:52 txqueuelen 1000 (Ethernet) >Oct 29 11:03:41 unused rc.local: RX packets 226 bytes 14599 (14.2 KiB) >Oct 29 11:03:41 unused rc.local: RX errors 0 dropped 2 overruns 0 frame 0 >Oct 29 11:03:41 unused rc.local: TX packets 0 bytes 0 (0.0 B) >Oct 29 11:03:41 unused rc.local: TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >Oct 29 11:03:41 unused rc.local: lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 >Oct 29 11:03:41 unused rc.local: inet 127.0.0.1 netmask 255.0.0.0 >Oct 29 11:03:41 unused rc.local: inet6 ::1 prefixlen 128 scopeid 0x10<host> >Oct 29 11:03:41 unused rc.local: loop txqueuelen 0 (Local Loopback) >Oct 29 11:03:41 unused rc.local: RX packets 12 bytes 1296 (1.2 KiB) >Oct 29 11:03:41 unused rc.local: RX errors 0 dropped 0 overruns 0 frame 0 >Oct 29 11:03:41 unused rc.local: TX packets 12 bytes 1296 (1.2 KiB) >Oct 29 11:03:41 unused rc.local: TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:41 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused systemd: Started Permit User Sessions. >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused systemd: Started /etc/rc.d/rc.local Compatibility. >Oct 29 11:03:42 unused systemd: PID file /var/run/rhnsd.pid not readable (yet?) after start. >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused systemd: Failed to start LSB: Starts the Spacewalk Daemon. >Oct 29 11:03:42 unused systemd: Unit rhnsd.service entered failed state. >Oct 29 11:03:42 unused systemd: Starting Command Scheduler... >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:42 unused systemd: Started Command Scheduler. >Oct 29 11:03:42 unused systemd: Starting Job spooling tools... >Oct 29 11:03:42 unused audispd: queue is full - dropping event >Oct 29 11:03:43 unused audispd: queue is full - dropping event >Oct 29 11:03:43 unused systemd: Started Job spooling tools. >Oct 29 11:03:43 unused systemd: Starting Wait for Plymouth Boot Screen to Quit... >Oct 29 11:03:43 unused systemd: Starting GNOME Display Manager... >Oct 29 11:03:44 unused libvirtd: 2014-10-29 03:03:44.756+0000: 1286: info : libvirt version: 1.2.8, package: 4.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2014-09-26-08:45:32, x86-021.build.eng.bos.redhat.com) >Oct 29 11:03:44 unused libvirtd: 2014-10-29 03:03:44.756+0000: 1286: warning : virGetHostname:665 : getaddrinfo failed for 'unused': Name or service not known >Oct 29 11:03:45 unused systemd: Started GNOME Display Manager. >Oct 29 11:03:45 unused dbus-daemon: dbus[672]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.17" (uid=0 pid=2215 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.18" (uid=0 pid=2399 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Oct 29 11:03:45 unused dbus[672]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.17" (uid=0 pid=2215 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.18" (uid=0 pid=2399 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Oct 29 11:03:45 unused setroubleshoot: Plugin Exception restorecon >Oct 29 11:03:45 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:03:45 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:45 unused kdumpctl: kexec: loaded kdump kernel >Oct 29 11:03:45 unused kdumpctl: Starting kdump: [OK] >Oct 29 11:03:45 unused NetworkManager[792]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) scheduled. >Oct 29 11:03:45 unused NetworkManager[792]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) started... >Oct 29 11:03:45 unused NetworkManager[792]: <info> (ens5): device state change: config -> ip-config (reason 'none') [50 70 0] >Oct 29 11:03:45 unused NetworkManager[792]: <info> Activation (ens5) Beginning DHCPv4 transaction (timeout in 45 seconds) >Oct 29 11:03:45 unused systemd: Started Crash recovery kernel arming. >Oct 29 11:03:45 unused setroubleshoot: Plugin Exception restorecon_source >Oct 29 11:03:46 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:03:46 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:46 unused journal: libvirt version: 1.2.8, package: 4.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2014-09-26-08:45:32, x86-021.build.eng.bos.redhat.com) >Oct 29 11:03:46 unused journal: Module /usr/lib64/libvirt/connection-driver/libvirt_driver_lxc.so not accessible >Oct 29 11:03:46 unused NetworkManager[792]: <info> dhclient started with pid 2491 >Oct 29 11:03:46 unused NetworkManager[792]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) complete. >Oct 29 11:03:46 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:03:46 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:46 unused NetworkManager[792]: <info> (ens5): DHCPv4 state changed nbi -> preinit >Oct 29 11:03:46 unused dhclient[2491]: DHCPREQUEST on ens5 to 255.255.255.255 port 67 (xid=0x4575cae3) >Oct 29 11:03:46 unused systemd: Started Virtualization daemon. >Oct 29 11:03:46 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:03:46 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:46 unused dhclient[2491]: DHCPACK from 10.66.111.254 (xid=0x4575cae3) >Oct 29 11:03:46 unused dhclient[2491]: bound to 10.66.110.85 -- renewal in 6496 seconds. >Oct 29 11:03:46 unused NetworkManager[792]: <info> (ens5): DHCPv4 state changed preinit -> reboot >Oct 29 11:03:46 unused NetworkManager[792]: <info> address 10.66.110.85 >Oct 29 11:03:46 unused NetworkManager[792]: <info> plen 21 (255.255.248.0) >Oct 29 11:03:46 unused NetworkManager[792]: <info> gateway 10.66.111.254 >Oct 29 11:03:46 unused NetworkManager[792]: <info> server identifier 10.66.78.111 >Oct 29 11:03:46 unused NetworkManager[792]: <info> lease time 14400 >Oct 29 11:03:46 unused NetworkManager[792]: <info> nameserver '10.66.78.111' >Oct 29 11:03:46 unused NetworkManager[792]: <info> nameserver '10.66.78.117' >Oct 29 11:03:46 unused NetworkManager[792]: <info> nameserver '10.66.127.10' >Oct 29 11:03:46 unused NetworkManager[792]: <info> domain name 'englab.nay.redhat.com' >Oct 29 11:03:46 unused NetworkManager[792]: <info> domain name 'qe.lab.eng.nay.redhat.com' >Oct 29 11:03:46 unused NetworkManager[792]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Configure Commit) scheduled... >Oct 29 11:03:46 unused NetworkManager[792]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Commit) started... >Oct 29 11:03:46 unused NetworkManager[792]: <info> (ens5): device state change: ip-config -> ip-check (reason 'none') [70 80 0] >Oct 29 11:03:46 unused NetworkManager[792]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Commit) complete. >Oct 29 11:03:46 unused NetworkManager[792]: <info> (ens5): device state change: ip-check -> secondaries (reason 'none') [80 90 0] >Oct 29 11:03:46 unused NetworkManager[792]: <info> (ens5): device state change: secondaries -> activated (reason 'none') [90 100 0] >Oct 29 11:03:46 unused NetworkManager[792]: <info> NetworkManager state is now CONNECTED_LOCAL >Oct 29 11:03:46 unused avahi-daemon[646]: Joining mDNS multicast group on interface ens5.IPv4 with address 10.66.110.85. >Oct 29 11:03:46 unused avahi-daemon[646]: New relevant interface ens5.IPv4 for mDNS. >Oct 29 11:03:46 unused avahi-daemon[646]: Registering new address record for 10.66.110.85 on ens5.IPv4. >Oct 29 11:03:46 unused NetworkManager[792]: <info> Policy set 'ens5' (ens5) as default for IPv4 routing and DNS. >Oct 29 11:03:46 unused NetworkManager[792]: <info> Activation (ens5) successful, device activated. >Oct 29 11:03:46 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:03:46 unused dbus[672]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Oct 29 11:03:46 unused dbus-daemon: dbus[672]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Oct 29 11:03:46 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:46 unused systemd: Starting Network Manager Script Dispatcher Service... >Oct 29 11:03:46 unused dbus-daemon: dbus[672]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Oct 29 11:03:46 unused dbus[672]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Oct 29 11:03:46 unused systemd: Started Network Manager Script Dispatcher Service. >Oct 29 11:03:46 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4232f3ec-5ccd-4850-ba76-4a70ff4565b6 >Oct 29 11:03:46 unused systemd: Started Postfix Mail Transport Agent. >Oct 29 11:03:46 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:46 unused systemd: Unit iscsi.service cannot be reloaded because it is inactive. >Oct 29 11:03:46 unused NetworkManager[792]: <info> startup complete >Oct 29 11:03:46 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 29 11:03:46 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:46 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 29 11:03:46 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:47 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f60195bb-d64d-4eb0-a8f4-cf8a2b920ac8 >Oct 29 11:03:47 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:47 unused avahi-daemon[646]: Registering new address record for fe80::984e:4fff:fe50:5152 on ens5.*. >Oct 29 11:03:47 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5ab16217-4ece-422d-83ed-2d510b7f6e4a >Oct 29 11:03:47 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:47 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l adc127d5-3ba3-4600-a18a-c60d41d563f5 >Oct 29 11:03:47 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:47 unused systemd: Started Wait for Plymouth Boot Screen to Quit. >Oct 29 11:03:47 unused systemd: Starting Serial Getty on ttyS0... >Oct 29 11:03:47 unused systemd: Started Serial Getty on ttyS0. >Oct 29 11:03:47 unused systemd: Starting Login Prompts. >Oct 29 11:03:47 unused systemd: Reached target Login Prompts. >Oct 29 11:03:47 unused systemd: Starting Multi-User System. >Oct 29 11:03:47 unused systemd: Reached target Multi-User System. >Oct 29 11:03:47 unused systemd: Starting Graphical Interface. >Oct 29 11:03:47 unused systemd: Reached target Graphical Interface. >Oct 29 11:03:47 unused systemd: Starting Update UTMP about System Runlevel Changes... >Oct 29 11:03:47 unused systemd: Started Stop Read-Ahead Data Collection 10s After Completed Startup. >Oct 29 11:03:47 unused systemd: Started Update UTMP about System Runlevel Changes. >Oct 29 11:03:47 unused systemd: Startup finished in 835ms (kernel) + 14.376s (initrd) + 32.833s (userspace) = 48.045s. >Oct 29 11:03:47 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:03:47 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:47 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 06db745f-002f-4e84-a79a-b463031747bc >Oct 29 11:03:47 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:48 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 06db745f-002f-4e84-a79a-b463031747bc >Oct 29 11:03:48 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:48 unused systemd: Starting user-42.slice. >Oct 29 11:03:48 unused systemd: Created slice user-42.slice. >Oct 29 11:03:48 unused systemd: Starting Session c1 of user gdm. >Oct 29 11:03:48 unused systemd: Started Session c1 of user gdm. >Oct 29 11:03:48 unused systemd-logind: New session c1 of user gdm. >Oct 29 11:03:48 unused systemd-logind: Linked /tmp/.X11-unix/X0 to /run/user/42/X11-display. >Oct 29 11:03:48 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:03:48 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:48 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8a2839f5-9652-4d11-b7f0-45cf9ee50720 >Oct 29 11:03:48 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:48 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:03:48 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:48 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:03:48 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:48 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l bb129500-3477-472a-b1a1-1b7d123c1da8 >Oct 29 11:03:48 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:48 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d95da5c3-8c53-450d-a9b2-dfb19b652de8 >Oct 29 11:03:48 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:49 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l db8f5c38-2bac-4875-a619-b204531cc812 >Oct 29 11:03:49 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:49 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 149193bb-28ed-4b94-9604-5e107a9da7e2 >Oct 29 11:03:49 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:49 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2003831-eae3-45bc-9b03-1dd96a73f949 >Oct 29 11:03:49 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:49 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d95da5c3-8c53-450d-a9b2-dfb19b652de8 >Oct 29 11:03:49 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:49 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:03:49 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:49 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5ab16217-4ece-422d-83ed-2d510b7f6e4a >Oct 29 11:03:49 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:49 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 11:03:49 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:49 unused dbus-daemon: dbus[672]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Oct 29 11:03:49 unused dbus[672]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Oct 29 11:03:49 unused systemd: Starting Daemon for power management... >Oct 29 11:03:49 unused dbus-daemon: dbus[672]: [system] Successfully activated service 'org.freedesktop.UPower' >Oct 29 11:03:49 unused dbus[672]: [system] Successfully activated service 'org.freedesktop.UPower' >Oct 29 11:03:49 unused systemd: Started Daemon for power management. >Oct 29 11:03:49 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 41005440-a55b-4233-93f3-db86ea99daba >Oct 29 11:03:49 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:50 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l af15d032-e5b6-477a-a4e0-d0db84c92e84 >Oct 29 11:03:50 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:50 unused gnome-session: (gnome-settings-daemon:2937): power-plugin-WARNING **: failed to turn the panel on: Display is not DPMS capable >Oct 29 11:03:50 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l af15d032-e5b6-477a-a4e0-d0db84c92e84 >Oct 29 11:03:50 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:50 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 75ef4f58-c198-49a6-9668-ae14c8a7007b >Oct 29 11:03:50 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:50 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b91b4263-e2c9-413f-9c5f-7869cacdb578 >Oct 29 11:03:50 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:50 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 97aea7ca-00fe-4e40-af8e-e0ec40282528 >Oct 29 11:03:50 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:50 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 94cf47a7-5a5c-405c-ab69-1601b787f238 >Oct 29 11:03:50 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:50 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 05d5fa63-cbd7-453f-b673-c378b16914f0 >Oct 29 11:03:50 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:51 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:03:51 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:51 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:03:51 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:51 unused dbus-daemon: dbus[672]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Oct 29 11:03:51 unused dbus[672]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Oct 29 11:03:51 unused gnome-session: Entering running state >Oct 29 11:03:51 unused systemd: Starting Manage, Install and Generate Color Profiles... >Oct 29 11:03:51 unused colord: Using config file /etc/colord.conf >Oct 29 11:03:51 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:03:51 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:51 unused colord: Using mapping database file /var/lib/colord/mapping.db >Oct 29 11:03:51 unused colord: Using device database file /var/lib/colord/storage.db >Oct 29 11:03:51 unused colord: loaded plugin libcd_plugin_camera.so >Oct 29 11:03:51 unused colord: loaded plugin libcd_plugin_scanner.so >Oct 29 11:03:51 unused colord: Daemon ready for requests >Oct 29 11:03:51 unused dbus-daemon: dbus[672]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Oct 29 11:03:51 unused dbus[672]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Oct 29 11:03:51 unused systemd: Started Manage, Install and Generate Color Profiles. >Oct 29 11:03:51 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8a64fd6d-c54b-4627-b7b5-44f0b14979dd >Oct 29 11:03:51 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:51 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 396a1310-4088-41c8-90a8-d43b4f19499c >Oct 29 11:03:51 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:51 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 396a1310-4088-41c8-90a8-d43b4f19499c >Oct 29 11:03:51 unused colord: Profile added: icc-021ec903471f953c28c57ccde43f9134 >Oct 29 11:03:51 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:51 unused colord: Profile added: icc-7e1e684edc9a0671f5305d656d8cb8c9 >Oct 29 11:03:51 unused colord: Profile added: icc-0f6451e33e7342d0f90bb960912bb812 >Oct 29 11:03:51 unused colord: Profile added: icc-8f465237bb45ee1d16fdbd6b4038c719 >Oct 29 11:03:51 unused colord: Profile added: icc-8daff74b7142df23f76b3d5ef126bbf9 >Oct 29 11:03:51 unused colord: Profile added: icc-f16a3fe7a0d2f471188cf45202ae43ac >Oct 29 11:03:51 unused rtkit-daemon[671]: Successfully made thread 3218 of process 3218 (/usr/bin/pulseaudio) owned by '42' high priority at nice level -11. >Oct 29 11:03:51 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d772382b-e332-4fba-8873-f558166b6023 >Oct 29 11:03:51 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:51 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2094586-a8f8-4bc1-af02-534887cfd2f4 >Oct 29 11:03:51 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:51 unused dbus-daemon: dbus[672]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 29 11:03:51 unused dbus[672]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 29 11:03:51 unused systemd: Starting Locale Service... >Oct 29 11:03:52 unused gnome-session: (gnome-settings-daemon:2937): color-plugin-WARNING **: failed to get edid: unable to get EDID for output >Oct 29 11:03:52 unused dbus-daemon: dbus[672]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 29 11:03:52 unused dbus[672]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 29 11:03:52 unused systemd: Started Locale Service. >Oct 29 11:03:52 unused colord: Device added: xrandr-Virtual-0 >Oct 29 11:03:52 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2094586-a8f8-4bc1-af02-534887cfd2f4 >Oct 29 11:03:52 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:52 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0b13c0cf-312e-4166-b485-88d815f566fb >Oct 29 11:03:52 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:52 unused gnome-session: (gnome-settings-daemon:2937): color-plugin-WARNING **: unable to get EDID for xrandr-Virtual-0: unable to get EDID for output >Oct 29 11:03:52 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b427ecb2-8229-4dc3-b9ee-ffea01dcd104 >Oct 29 11:03:52 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:52 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:03:52 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:52 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0e7f911c-862c-4a1b-bdef-924387d5c7e9 >Oct 29 11:03:52 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:52 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::primary after class was initialised >Oct 29 11:03:52 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::index after class was initialised >Oct 29 11:03:52 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:03:52 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:52 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 04b4c9d6-e337-439c-bb70-255a7898dcb3 >Oct 29 11:03:52 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:52 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:03:52 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:53 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5f10f707-7a84-461f-9e81-f835d4ea195d >Oct 29 11:03:53 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:53 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:03:53 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:53 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0e378e0b-9b3c-4d2f-84b9-ce2845665953 >Oct 29 11:03:53 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:53 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b94cfdf3-87b2-4b6e-abf5-837aee9d5e47 >Oct 29 11:03:53 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:53 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:03:53 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:53 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 829d18ca-3d16-4e5a-8496-a95d9ab10d6c >Oct 29 11:03:53 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:53 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 63dc4b7a-9372-4551-bd5d-9f0980157bc4 >Oct 29 11:03:53 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:54 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l be15d920-943b-4dae-ab10-813bdf4c9056 >Oct 29 11:03:54 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:54 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:03:54 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:54 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f31e2e16-ef9a-43df-bba1-a28015fc34cb >Oct 29 11:03:54 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:54 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:03:54 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:54 unused gnome-session: JS LOG: GNOME Shell started at Wed Oct 29 2014 11:03:54 GMT+0800 (CST) >Oct 29 11:03:54 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f31e2e16-ef9a-43df-bba1-a28015fc34cb >Oct 29 11:03:54 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:54 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:03:54 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:54 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:03:54 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:54 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:03:54 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:55 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:03:55 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:55 unused dbus-daemon: dbus[672]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Oct 29 11:03:55 unused dbus[672]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Oct 29 11:03:55 unused systemd: Starting Fingerprint Authentication Daemon... >Oct 29 11:03:55 unused dbus-daemon: dbus[672]: [system] Successfully activated service 'net.reactivated.Fprint' >Oct 29 11:03:55 unused dbus[672]: [system] Successfully activated service 'net.reactivated.Fprint' >Oct 29 11:03:55 unused systemd: Started Fingerprint Authentication Daemon. >Oct 29 11:03:55 unused fprintd: Launching FprintObject >Oct 29 11:03:55 unused fprintd: ** Message: D-Bus service launched with name: net.reactivated.Fprint >Oct 29 11:03:55 unused fprintd: ** Message: entering main loop >Oct 29 11:03:55 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:03:55 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:55 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 88a7869a-040a-4f0e-80c5-b6a4e8755bb3 >Oct 29 11:03:55 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:55 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:03:55 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:55 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:03:55 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:55 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l dc7e7c9b-7e67-4b25-821f-418ef1def3e4 >Oct 29 11:03:55 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:55 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:03:55 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:56 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:03:56 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:56 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:03:56 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:56 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8dd8c574-fc63-4b6f-9f6c-45c2df7870d4 >Oct 29 11:03:56 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:56 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 11:03:56 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:56 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 3ed0fa73-53ef-48c0-bb88-c1fd8f856461 >Oct 29 11:03:56 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:56 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 11:03:56 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:56 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 87bc0983-0c80-42d2-a090-26c7ed966389 >Oct 29 11:03:56 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:57 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:03:57 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:57 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 662b296c-ea25-47bd-84bd-07c07b1ea287 >Oct 29 11:03:57 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:57 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:03:57 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:03:57 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:03:57 unused dbus-daemon: string index out of range >Oct 29 11:03:57 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 29 11:04:01 unused systemd: Starting user-0.slice. >Oct 29 11:04:01 unused systemd: Created slice user-0.slice. >Oct 29 11:04:01 unused systemd: Starting Session 1 of user root. >Oct 29 11:04:01 unused systemd-logind: New session 1 of user root. >Oct 29 11:04:01 unused systemd: Started Session 1 of user root. >Oct 29 11:04:25 unused fprintd: ** Message: No devices in use, exit >Oct 29 11:06:49 unused chronyd[669]: Selected source 10.5.26.10 >Oct 29 11:06:49 unused chronyd[669]: System clock wrong by 1.072052 seconds, adjustment started >Oct 29 11:07:02 unused kernel: sr 0:0:1:0: device reset >Oct 29 11:07:02 unused kernel: sr 0:0:1:0: Device offlined - not ready after error recovery >Oct 29 11:07:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:04 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:06 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:08 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:11 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:13 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:15 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:17 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:19 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:21 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:23 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:25 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:27 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:29 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:31 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:33 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:35 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:37 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:39 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:41 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:43 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:45 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:47 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:49 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:51 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:54 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:54 unused chronyd[669]: Selected source 10.66.127.10 >Oct 29 11:07:56 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:07:58 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:00 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:04 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:06 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:08 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:10 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:12 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:14 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:16 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:18 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:20 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:22 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:24 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:26 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:28 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:30 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:32 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:35 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:37 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:39 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:41 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:43 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:45 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:47 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:49 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:51 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:53 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:55 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:57 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:08:59 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:01 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:03 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:05 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:07 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:09 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:11 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:13 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:15 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:18 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:20 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:22 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:24 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:26 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:28 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:30 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:32 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:36 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:38 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:40 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:42 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:44 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:46 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:48 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:50 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:52 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:53 unused NetworkManager[792]: <info> NetworkManager state is now CONNECTED_GLOBAL >Oct 29 11:09:53 unused goa[3941]: goa-daemon version 3.8.5 starting [main.c:113, main()] >Oct 29 11:09:53 unused goa[3941]: GoaKerberosIdentityManager: Using polling for change notification for credential cache type 'KEYRING' [goakerberosidentitymanager.c:1386, monitor_credentials_cache()] >Oct 29 11:09:54 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:56 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:09:58 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:01 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:01 unused dbus-daemon: Exception in thread Thread-1 (most likely raised during interpreter shutdown):dbus[672]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:10:01 unused dbus[672]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:10:01 unused systemd: Starting Session 2 of user root. >Oct 29 11:10:01 unused systemd: Started Session 2 of user root. >Oct 29 11:10:01 unused dbus-daemon: dbus[672]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:10:01 unused dbus[672]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:10:01 unused journal: Suppressed 2963 messages from /system.slice/dbus.service >Oct 29 11:10:02 unused setroubleshoot: Plugin Exception restorecon_source >Oct 29 11:10:02 unused setroubleshoot: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . For complete SELinux messages. run sealert -l 48fca7c8-976d-46e5-9bdc-8be5be60840d >Oct 29 11:10:02 unused python: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that prelink should be allowed setattr access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:10:03 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:05 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:05 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:05 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:05 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:05 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:08 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:10 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:12 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:12 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 29 11:10:14 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:16 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:18 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:20 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:22 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:24 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:26 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:28 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:30 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:32 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:36 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:38 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:40 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:43 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:45 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:47 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:49 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:51 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:53 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:55 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:57 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:10:59 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:01 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:03 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:05 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:07 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:09 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:11 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:13 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:15 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:17 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:19 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:21 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:23 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:26 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:28 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:30 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:32 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:36 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:38 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:40 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:42 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:44 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:46 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:48 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:50 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:52 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:54 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:56 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:11:58 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:00 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:04 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:06 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:09 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:11 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:13 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:15 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:15 unused chronyd[669]: Selected source 10.5.26.10 >Oct 29 11:12:17 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:19 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:21 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:23 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:25 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:27 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:29 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:31 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:33 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:35 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:37 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:39 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:41 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:43 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:45 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:47 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:49 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:52 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:54 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:56 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:12:58 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:00 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:04 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:06 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:08 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:10 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:12 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:14 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:16 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:18 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:20 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:22 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:24 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:26 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:28 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:30 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:32 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:35 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:37 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:39 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:41 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:43 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:45 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:47 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:49 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:51 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:53 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:55 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:57 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:13:59 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:01 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:03 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:05 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:07 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:09 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:11 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:13 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:15 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:18 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:20 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:22 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:24 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:26 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:28 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:30 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:32 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:36 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:38 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:40 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:42 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:44 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:46 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:48 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:50 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:52 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:54 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:56 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:14:59 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:01 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:03 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:05 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:07 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:09 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:11 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:13 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:15 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:17 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:19 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:21 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:23 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:25 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:27 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:29 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:31 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:33 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:35 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:37 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:39 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:42 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:44 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:46 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:48 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:50 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:52 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:54 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:56 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:15:58 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:00 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:04 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:06 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:08 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:10 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:12 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:14 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:16 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:18 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:20 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:22 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:25 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:27 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:29 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:31 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:33 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:35 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:37 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:39 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:41 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:43 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:45 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:47 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:49 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:51 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:53 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:55 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:57 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:16:59 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:01 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:03 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:05 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:08 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:10 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:12 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:14 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:16 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:18 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:20 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:22 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:24 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:26 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:28 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:30 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:32 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:36 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:38 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:40 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:42 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:44 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:46 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:48 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:51 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:53 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:55 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:57 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:59 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:17:59 unused systemd: Starting Cleanup of Temporary Directories... >Oct 29 11:17:59 unused systemd: Started Cleanup of Temporary Directories. >Oct 29 11:18:01 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:03 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:05 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:07 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:09 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:11 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:13 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:15 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:17 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:19 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:21 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:23 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:25 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:27 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:29 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:31 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:36 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:38 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:40 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:42 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:44 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:46 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:48 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:50 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:52 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:54 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:56 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:18:58 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:00 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:04 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:06 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:08 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:10 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:12 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:13 unused yum[4109]: Installed: kernel-3.10.0-196.el7.x86_64 >Oct 29 11:19:13 unused dracut: dracut- >Oct 29 11:19:13 unused dracut: Executing: /sbin/dracut -f /boot/initramfs-3.10.0-196.el7.x86_64.img 3.10.0-196.el7.x86_64 >Oct 29 11:19:15 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:16 unused dracut: *** Including module: bash *** >Oct 29 11:19:16 unused dracut: *** Including module: i18n *** >Oct 29 11:19:17 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:17 unused dracut: *** Including module: network *** >Oct 29 11:19:18 unused dracut: *** Including module: ifcfg *** >Oct 29 11:19:18 unused dracut: *** Including module: drm *** >Oct 29 11:19:18 unused dracut: *** Including module: plymouth *** >Oct 29 11:19:19 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:19 unused dracut: *** Including module: dm *** >Oct 29 11:19:19 unused dracut: Skipping udev rule: 64-device-mapper.rules >Oct 29 11:19:19 unused dracut: Skipping udev rule: 60-persistent-storage-dm.rules >Oct 29 11:19:19 unused dracut: Skipping udev rule: 55-dm.rules >Oct 29 11:19:19 unused dracut: *** Including module: kernel-modules *** >Oct 29 11:19:21 unused dracut: *** Including module: lvm *** >Oct 29 11:19:21 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:21 unused dracut: Skipping udev rule: 64-device-mapper.rules >Oct 29 11:19:21 unused dracut: Skipping udev rule: 56-lvm.rules >Oct 29 11:19:21 unused dracut: Skipping udev rule: 60-persistent-storage-lvm.rules >Oct 29 11:19:21 unused dracut: *** Including module: fcoe *** >Oct 29 11:19:21 unused dracut: *** Including module: fcoe-uefi *** >Oct 29 11:19:21 unused dracut: *** Including module: resume *** >Oct 29 11:19:21 unused dracut: *** Including module: rootfs-block *** >Oct 29 11:19:21 unused dracut: *** Including module: terminfo *** >Oct 29 11:19:21 unused dracut: *** Including module: udev-rules *** >Oct 29 11:19:21 unused dracut: Skipping udev rule: 91-permissions.rules >Oct 29 11:19:21 unused dracut: *** Including module: biosdevname *** >Oct 29 11:19:21 unused dracut: *** Including module: systemd *** >Oct 29 11:19:22 unused dracut: *** Including module: usrmount *** >Oct 29 11:19:22 unused dracut: *** Including module: base *** >Oct 29 11:19:22 unused dracut: *** Including module: fs-lib *** >Oct 29 11:19:22 unused dracut: *** Including module: shutdown *** >Oct 29 11:19:22 unused dracut: *** Including module: uefi-lib *** >Oct 29 11:19:22 unused dracut: *** Including modules done *** >Oct 29 11:19:22 unused dracut: *** Installing kernel module dependencies and firmware *** >Oct 29 11:19:22 unused dracut: *** Installing kernel module dependencies and firmware done *** >Oct 29 11:19:22 unused dracut: *** Resolving executable dependencies *** >Oct 29 11:19:23 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:23 unused dracut: *** Resolving executable dependencies done*** >Oct 29 11:19:23 unused dracut: *** Pre-linking files *** >Oct 29 11:19:24 unused dracut: *** Pre-linking files done *** >Oct 29 11:19:24 unused dracut: *** Hardlinking files *** >Oct 29 11:19:24 unused dracut: *** Hardlinking files done *** >Oct 29 11:19:24 unused dracut: *** Stripping files *** >Oct 29 11:19:24 unused dracut: *** Stripping files done *** >Oct 29 11:19:24 unused dracut: *** Generating early-microcode cpio image *** >Oct 29 11:19:24 unused dracut: *** Constructing GenuineIntel.bin **** >Oct 29 11:19:24 unused dracut: *** Store current command line parameters *** >Oct 29 11:19:24 unused dracut: *** Creating image file *** >Oct 29 11:19:25 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:27 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:29 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:31 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:33 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:35 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:36 unused dracut: *** Creating image file done *** >Oct 29 11:19:37 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:39 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:41 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:43 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:45 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:47 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:49 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:51 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:53 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:55 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:19:58 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:20:00 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:20:01 unused dbus-daemon: dbus[672]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:20:01 unused dbus[672]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:20:01 unused systemd: Starting Session 3 of user root. >Oct 29 11:20:01 unused systemd: Started Session 3 of user root. >Oct 29 11:20:01 unused dbus-daemon: dbus[672]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:20:01 unused dbus[672]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:20:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:20:02 unused setroubleshoot: Plugin Exception restorecon_source >Oct 29 11:20:02 unused setroubleshoot: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . For complete SELinux messages. run sealert -l 48fca7c8-976d-46e5-9bdc-8be5be60840d >Oct 29 11:20:02 unused python: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that prelink should be allowed setattr access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:20:04 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:20:06 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:20:08 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:20:10 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:20:12 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:20:12 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 29 11:20:14 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:20:16 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:20:18 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:20:20 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:20:22 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:20:24 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:20:26 unused systemd: Stopping Session 1 of user root. >Oct 29 11:20:26 unused systemd: Stopping Session c1 of user gdm. >Oct 29 11:20:26 unused systemd: Stopping LVM2 PV scan on device 8:2... >Oct 29 11:20:26 unused rsyslogd: [origin software="rsyslogd" swVersion="7.4.7" x-pid="653" x-info="http://www.rsyslog.com"] exiting on signal 15. >Oct 29 11:21:06 unused rsyslogd: [origin software="rsyslogd" swVersion="7.4.7" x-pid="654" x-info="http://www.rsyslog.com"] start >Oct 29 11:20:35 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:20:35 unused kernel: Initializing cgroup subsys cpuset >Oct 29 11:20:35 unused kernel: Initializing cgroup subsys cpu >Oct 29 11:20:35 unused kernel: Initializing cgroup subsys cpuacct >Oct 29 11:20:35 unused kernel: Linux version 3.10.0-196.el7.x86_64 (mockbuild@x86-018.build.eng.bos.redhat.com) (gcc version 4.8.3 20140911 (Red Hat 4.8.3-7) (GCC) ) #1 SMP Tue Oct 28 11:16:22 EDT 2014 >Oct 29 11:20:35 unused kernel: Command line: BOOT_IMAGE=/vmlinuz-3.10.0-196.el7.x86_64 root=/dev/mapper/rhel_unused-root ro crashkernel=auto rd.lvm.lv=rhel_unused/root rd.lvm.lv=rhel_unused/swap console=tty0 console=ttyS0,115200 LANG=en_US.UTF-8 systemd.debug >Oct 29 11:20:35 unused kernel: e820: BIOS-provided physical RAM map: >Oct 29 11:20:35 unused kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable >Oct 29 11:20:35 unused kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved >Oct 29 11:20:35 unused kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved >Oct 29 11:20:35 unused kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdffff] usable >Oct 29 11:20:35 unused kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved >Oct 29 11:20:35 unused kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved >Oct 29 11:20:35 unused kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved >Oct 29 11:20:35 unused kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable >Oct 29 11:20:35 unused kernel: NX (Execute Disable) protection: active >Oct 29 11:20:35 unused kernel: SMBIOS 2.8 present. >Oct 29 11:20:35 unused kernel: Hypervisor detected: KVM >Oct 29 11:20:35 unused kernel: No AGP bridge found >Oct 29 11:20:35 unused kernel: e820: last_pfn = 0x140000 max_arch_pfn = 0x400000000 >Oct 29 11:20:35 unused kernel: x86 PAT enabled: cpu 0, old 0x7040600070406, new 0x7010600070106 >Oct 29 11:20:35 unused kernel: e820: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 >Oct 29 11:20:35 unused kernel: found SMP MP-table at [mem 0x000f2030-0x000f203f] mapped at [ffff8800000f2030] >Oct 29 11:20:35 unused kernel: init_memory_mapping: [mem 0x00000000-0x000fffff] >Oct 29 11:20:35 unused kernel: init_memory_mapping: [mem 0x13fe00000-0x13fffffff] >Oct 29 11:20:35 unused kernel: init_memory_mapping: [mem 0x13c000000-0x13fdfffff] >Oct 29 11:20:35 unused kernel: init_memory_mapping: [mem 0x100000000-0x13bffffff] >Oct 29 11:20:35 unused kernel: init_memory_mapping: [mem 0x00100000-0xbffdffff] >Oct 29 11:20:35 unused kernel: RAMDISK: [mem 0x35d2e000-0x36e8efff] >Oct 29 11:20:35 unused kernel: ACPI: RSDP 00000000000f1d90 00014 (v00 BOCHS ) >Oct 29 11:20:35 unused kernel: ACPI: RSDT 00000000bffe1931 00030 (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001) >Oct 29 11:20:35 unused kernel: ACPI: FACP 00000000bffe0b37 00074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001) >Oct 29 11:20:35 unused kernel: ACPI: DSDT 00000000bffe0040 00AF7 (v01 BOCHS BXPCDSDT 00000001 BXPC 00000001) >Oct 29 11:20:35 unused kernel: ACPI: FACS 00000000bffe0000 00040 >Oct 29 11:20:35 unused kernel: ACPI: SSDT 00000000bffe0bab 00CF6 (v01 BOCHS BXPCSSDT 00000001 BXPC 00000001) >Oct 29 11:20:35 unused kernel: ACPI: APIC 00000000bffe18a1 00090 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001) >Oct 29 11:20:35 unused kernel: No NUMA configuration found >Oct 29 11:20:35 unused kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] >Oct 29 11:20:35 unused kernel: Initmem setup node 0 [mem 0x00000000-0x13fffffff] >Oct 29 11:20:35 unused kernel: NODE_DATA [mem 0x13ffd6000-0x13fffcfff] >Oct 29 11:20:35 unused kernel: Reserving 161MB of memory at 688MB for crashkernel (System RAM: 4095MB) >Oct 29 11:20:35 unused kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 >Oct 29 11:20:35 unused kernel: kvm-clock: cpu 0, msr 1:3ff86001, primary cpu clock >Oct 29 11:20:35 unused kernel: Zone ranges: >Oct 29 11:20:35 unused kernel: DMA [mem 0x00001000-0x00ffffff] >Oct 29 11:20:35 unused kernel: DMA32 [mem 0x01000000-0xffffffff] >Oct 29 11:20:35 unused kernel: Normal [mem 0x100000000-0x13fffffff] >Oct 29 11:20:35 unused kernel: Movable zone start for each node >Oct 29 11:20:35 unused kernel: Early memory node ranges >Oct 29 11:20:35 unused kernel: node 0: [mem 0x00001000-0x0009efff] >Oct 29 11:20:35 unused kernel: node 0: [mem 0x00100000-0xbffdffff] >Oct 29 11:20:35 unused kernel: node 0: [mem 0x100000000-0x13fffffff] >Oct 29 11:20:35 unused kernel: ACPI: PM-Timer IO Port: 0x608 >Oct 29 11:20:35 unused kernel: ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled) >Oct 29 11:20:35 unused kernel: ACPI: LAPIC (acpi_id[0x01] lapic_id[0x01] enabled) >Oct 29 11:20:35 unused kernel: ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled) >Oct 29 11:20:35 unused kernel: ACPI: LAPIC (acpi_id[0x03] lapic_id[0x03] enabled) >Oct 29 11:20:35 unused kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) >Oct 29 11:20:35 unused kernel: ACPI: IOAPIC (id[0x00] address[0xfec00000] gsi_base[0]) >Oct 29 11:20:35 unused kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 >Oct 29 11:20:35 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) >Oct 29 11:20:35 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) >Oct 29 11:20:35 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) >Oct 29 11:20:35 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) >Oct 29 11:20:35 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) >Oct 29 11:20:35 unused kernel: Using ACPI (MADT) for SMP configuration information >Oct 29 11:20:35 unused kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs >Oct 29 11:20:35 unused kernel: PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff] >Oct 29 11:20:35 unused kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000effff] >Oct 29 11:20:35 unused kernel: PM: Registered nosave memory: [mem 0x000f0000-0x000fffff] >Oct 29 11:20:35 unused kernel: PM: Registered nosave memory: [mem 0xbffe0000-0xbfffffff] >Oct 29 11:20:35 unused kernel: PM: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] >Oct 29 11:20:35 unused kernel: PM: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] >Oct 29 11:20:35 unused kernel: PM: Registered nosave memory: [mem 0xff000000-0xfffbffff] >Oct 29 11:20:35 unused kernel: PM: Registered nosave memory: [mem 0xfffc0000-0xffffffff] >Oct 29 11:20:35 unused kernel: e820: [mem 0xc0000000-0xfeffbfff] available for PCI devices >Oct 29 11:20:35 unused kernel: Booting paravirtualized kernel on KVM >Oct 29 11:20:35 unused kernel: setup_percpu: NR_CPUS:5120 nr_cpumask_bits:4 nr_cpu_ids:4 nr_node_ids:1 >Oct 29 11:20:35 unused kernel: PERCPU: Embedded 29 pages/cpu @ffff88013fc00000 s86720 r8192 d23872 u524288 >Oct 29 11:20:35 unused kernel: KVM setup async PF for cpu 0 >Oct 29 11:20:35 unused kernel: kvm-stealtime: cpu 0, msr 13fc0e000 >Oct 29 11:20:35 unused kernel: Built 1 zonelists in Node order, mobility grouping on. Total pages: 1032041 >Oct 29 11:20:35 unused kernel: Policy zone: Normal >Oct 29 11:20:35 unused kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-3.10.0-196.el7.x86_64 root=/dev/mapper/rhel_unused-root ro crashkernel=auto rd.lvm.lv=rhel_unused/root rd.lvm.lv=rhel_unused/swap console=tty0 console=ttyS0,115200 LANG=en_US.UTF-8 systemd.debug >Oct 29 11:20:35 unused kernel: PID hash table entries: 4096 (order: 3, 32768 bytes) >Oct 29 11:20:35 unused kernel: xsave: enabled xstate_bv 0x7, cntxt size 0x340 >Oct 29 11:20:35 unused kernel: Checking aperture... >Oct 29 11:20:35 unused kernel: No AGP bridge found >Oct 29 11:20:35 unused kernel: Memory: 3863488k/5242880k available (6240k kernel code, 1049096k absent, 330296k reserved, 4181k data, 1604k init) >Oct 29 11:20:35 unused kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 >Oct 29 11:20:35 unused kernel: Hierarchical RCU implementation. >Oct 29 11:20:35 unused kernel: RCU restricting CPUs from NR_CPUS=5120 to nr_cpu_ids=4. >Oct 29 11:20:35 unused kernel: Experimental no-CBs for all CPUs >Oct 29 11:20:35 unused kernel: Experimental no-CBs CPUs: 0-3. >Oct 29 11:20:35 unused kernel: NR_IRQS:327936 nr_irqs:712 16 >Oct 29 11:20:35 unused kernel: Console: colour VGA+ 80x25 >Oct 29 11:20:35 unused kernel: console [tty0] enabled >Oct 29 11:20:35 unused kernel: console [ttyS0] enabled >Oct 29 11:20:35 unused kernel: allocated 16777216 bytes of page_cgroup >Oct 29 11:20:35 unused kernel: please try 'cgroup_disable=memory' option if you don't want memory cgroups >Oct 29 11:20:35 unused kernel: tsc: Detected 1999.999 MHz processor >Oct 29 11:20:35 unused kernel: Calibrating delay loop (skipped) preset value.. 3999.99 BogoMIPS (lpj=1999999) >Oct 29 11:20:35 unused kernel: pid_max: default: 32768 minimum: 301 >Oct 29 11:20:35 unused kernel: Security Framework initialized >Oct 29 11:20:35 unused kernel: SELinux: Initializing. >Oct 29 11:20:35 unused kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes) >Oct 29 11:20:35 unused kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes) >Oct 29 11:20:35 unused kernel: Mount-cache hash table entries: 4096 >Oct 29 11:20:35 unused kernel: Initializing cgroup subsys memory >Oct 29 11:20:35 unused kernel: Initializing cgroup subsys devices >Oct 29 11:20:35 unused kernel: Initializing cgroup subsys freezer >Oct 29 11:20:35 unused kernel: Initializing cgroup subsys net_cls >Oct 29 11:20:35 unused kernel: Initializing cgroup subsys blkio >Oct 29 11:20:35 unused kernel: Initializing cgroup subsys perf_event >Oct 29 11:20:35 unused kernel: Initializing cgroup subsys hugetlb >Oct 29 11:20:35 unused kernel: CPU: Physical Processor ID: 0 >Oct 29 11:20:35 unused kernel: CPU: Processor Core ID: 0 >Oct 29 11:20:35 unused kernel: mce: CPU supports 10 MCE banks >Oct 29 11:20:35 unused kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 >Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0 >tlb_flushall_shift: 6 >Oct 29 11:20:35 unused kernel: Freeing SMP alternatives: 24k freed >Oct 29 11:20:35 unused kernel: ACPI: Core revision 20130517 >Oct 29 11:20:35 unused kernel: ACPI: All ACPI Tables successfully acquired >Oct 29 11:20:35 unused kernel: ftrace: allocating 23897 entries in 94 pages >Oct 29 11:20:35 unused kernel: Enabling x2apic >Oct 29 11:20:35 unused kernel: Enabled x2apic >Oct 29 11:20:35 unused kernel: Switched APIC routing to physical x2apic. >Oct 29 11:20:35 unused kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 >Oct 29 11:20:35 unused kernel: smpboot: CPU0: Intel Xeon E312xx (Sandy Bridge) (fam: 06, model: 2a, stepping: 01) >Oct 29 11:20:35 unused kernel: Performance Events: unsupported p6 CPU model 42 no PMU driver, software events only. >Oct 29 11:20:35 unused kernel: KVM setup paravirtual spinlock >Oct 29 11:20:35 unused kernel: NMI watchdog: disabled (cpu0): hardware events not enabled >Oct 29 11:20:35 unused kernel: kvm-clock: cpu 1, msr 1:3ff86041, secondary cpu clock >Oct 29 11:20:35 unused kernel: KVM setup async PF for cpu 1 >Oct 29 11:20:35 unused kernel: kvm-stealtime: cpu 1, msr 13fc8e000 >Oct 29 11:20:35 unused kernel: kvm-clock: cpu 2, msr 1:3ff86081, secondary cpu clock >Oct 29 11:20:35 unused kernel: KVM setup async PF for cpu 2 >Oct 29 11:20:35 unused kernel: smpboot: Booting Node 0, Processors #1 #2 #3 OK >Oct 29 11:20:35 unused kernel: kvm-stealtime: cpu 2, msr 13fd0e000 >Oct 29 11:20:35 unused kernel: kvm-clock: cpu 3, msr 1:3ff860c1, secondary cpu clock >Oct 29 11:20:35 unused kernel: Brought up 4 CPUs >Oct 29 11:20:35 unused kernel: KVM setup async PF for cpu 3 >Oct 29 11:20:35 unused kernel: kvm-stealtime: cpu 3, msr 13fd8e000 >Oct 29 11:20:35 unused kernel: smpboot: Total of 4 processors activated (15999.99 BogoMIPS) >Oct 29 11:20:35 unused kernel: devtmpfs: initialized >Oct 29 11:20:35 unused kernel: EVM: security.selinux >Oct 29 11:20:35 unused kernel: EVM: security.ima >Oct 29 11:20:35 unused kernel: EVM: security.capability >Oct 29 11:20:35 unused kernel: atomic64 test passed for x86-64 platform with CX8 and with SSE >Oct 29 11:20:35 unused kernel: NET: Registered protocol family 16 >Oct 29 11:20:35 unused kernel: ACPI: bus type PCI registered >Oct 29 11:20:35 unused kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 >Oct 29 11:20:35 unused kernel: PCI: Using configuration type 1 for base access >Oct 29 11:20:35 unused kernel: ACPI: Added _OSI(Module Device) >Oct 29 11:20:35 unused kernel: ACPI: Added _OSI(Processor Device) >Oct 29 11:20:35 unused kernel: ACPI: Added _OSI(3.0 _SCP Extensions) >Oct 29 11:20:35 unused kernel: ACPI: Added _OSI(Processor Aggregator Device) >Oct 29 11:20:35 unused kernel: ACPI: Interpreter enabled >Oct 29 11:20:35 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S1_] (20130517/hwxface-571) >Oct 29 11:20:35 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S2_] (20130517/hwxface-571) >Oct 29 11:20:35 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S3_] (20130517/hwxface-571) >Oct 29 11:20:35 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S4_] (20130517/hwxface-571) >Oct 29 11:20:35 unused kernel: ACPI: (supports S0 S5) >Oct 29 11:20:35 unused kernel: ACPI: Using IOAPIC for interrupt routing >Oct 29 11:20:35 unused kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug >Oct 29 11:20:35 unused kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) >Oct 29 11:20:35 unused kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI] >Oct 29 11:20:35 unused kernel: acpi PNP0A03:00: _OSC failed (AE_NOT_FOUND); disabling ASPM >Oct 29 11:20:35 unused kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. >Oct 29 11:20:35 unused kernel: acpiphp: Slot [4] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [5] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [6] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [7] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [8] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [9] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [10] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [11] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [12] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [13] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [14] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [15] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [16] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [17] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [18] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [19] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [20] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [21] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [22] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [23] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [24] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [25] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [26] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [27] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [28] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [29] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [30] registered >Oct 29 11:20:35 unused kernel: acpiphp: Slot [31] registered >Oct 29 11:20:35 unused kernel: PCI host bridge to bus 0000:00 >Oct 29 11:20:35 unused kernel: pci_bus 0000:00: root bus resource [bus 00-ff] >Oct 29 11:20:35 unused kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7] >Oct 29 11:20:35 unused kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xadff] >Oct 29 11:20:35 unused kernel: pci_bus 0000:00: root bus resource [io 0xae0f-0xaeff] >Oct 29 11:20:35 unused kernel: pci_bus 0000:00: root bus resource [io 0xaf20-0xafdf] >Oct 29 11:20:35 unused kernel: pci_bus 0000:00: root bus resource [io 0xafe4-0xffff] >Oct 29 11:20:35 unused kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff] >Oct 29 11:20:35 unused kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff] >Oct 29 11:20:35 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] >Oct 29 11:20:35 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] >Oct 29 11:20:35 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] >Oct 29 11:20:35 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] >Oct 29 11:20:35 unused kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI >Oct 29 11:20:35 unused kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB >Oct 29 11:20:35 unused kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) >Oct 29 11:20:35 unused kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) >Oct 29 11:20:35 unused kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) >Oct 29 11:20:35 unused kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) >Oct 29 11:20:35 unused kernel: ACPI: PCI Interrupt Link [LNKS] (IRQs *9) >Oct 29 11:20:35 unused kernel: ACPI: Enabled 16 GPEs in block 00 to 0F >Oct 29 11:20:35 unused kernel: vgaarb: device added: PCI:0000:00:02.0,decodes=io+mem,owns=io+mem,locks=none >Oct 29 11:20:35 unused kernel: vgaarb: loaded >Oct 29 11:20:35 unused kernel: vgaarb: bridge control possible 0000:00:02.0 >Oct 29 11:20:35 unused kernel: SCSI subsystem initialized >Oct 29 11:20:35 unused kernel: ACPI: bus type USB registered >Oct 29 11:20:35 unused kernel: usbcore: registered new interface driver usbfs >Oct 29 11:20:35 unused kernel: usbcore: registered new interface driver hub >Oct 29 11:20:35 unused kernel: usbcore: registered new device driver usb >Oct 29 11:20:35 unused kernel: PCI: Using ACPI for IRQ routing >Oct 29 11:20:35 unused kernel: NetLabel: Initializing >Oct 29 11:20:35 unused kernel: NetLabel: domain hash size = 128 >Oct 29 11:20:35 unused kernel: NetLabel: protocols = UNLABELED CIPSOv4 >Oct 29 11:20:35 unused kernel: NetLabel: unlabeled traffic allowed by default >Oct 29 11:20:35 unused kernel: Switching to clocksource kvm-clock >Oct 29 11:20:35 unused kernel: pnp: PnP ACPI init >Oct 29 11:20:35 unused kernel: ACPI: bus type PNP registered >Oct 29 11:20:35 unused kernel: pnp: PnP ACPI: found 5 devices >Oct 29 11:20:35 unused kernel: ACPI: bus type PNP unregistered >Oct 29 11:20:35 unused kernel: NET: Registered protocol family 2 >Oct 29 11:20:35 unused kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes) >Oct 29 11:20:35 unused kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes) >Oct 29 11:20:35 unused kernel: TCP: Hash tables configured (established 32768 bind 32768) >Oct 29 11:20:35 unused kernel: TCP: reno registered >Oct 29 11:20:35 unused kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes) >Oct 29 11:20:35 unused kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes) >Oct 29 11:20:35 unused kernel: NET: Registered protocol family 1 >Oct 29 11:20:35 unused kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers >Oct 29 11:20:35 unused kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release >Oct 29 11:20:35 unused kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds >Oct 29 11:20:35 unused kernel: ACPI: PCI Interrupt Link [LNKC] enabled at IRQ 11 >Oct 29 11:20:35 unused kernel: Unpacking initramfs... >Oct 29 11:20:35 unused kernel: Freeing initrd memory: 17796k freed >Oct 29 11:20:35 unused kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) >Oct 29 11:20:35 unused kernel: software IO TLB [mem 0xbbfe0000-0xbffe0000] (64MB) mapped at [ffff8800bbfe0000-ffff8800bffdffff] >Oct 29 11:20:35 unused kernel: microcode: CPU0 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:20:35 unused kernel: microcode: CPU1 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:20:35 unused kernel: microcode: CPU2 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:20:35 unused kernel: microcode: CPU3 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:20:35 unused kernel: microcode: Microcode Update Driver: v2.00 <tigran@aivazian.fsnet.co.uk>, Peter Oruba >Oct 29 11:20:35 unused kernel: futex hash table entries: 1024 (order: 4, 65536 bytes) >Oct 29 11:20:35 unused kernel: Initialise system trusted keyring >Oct 29 11:20:35 unused kernel: audit: initializing netlink socket (disabled) >Oct 29 11:20:35 unused kernel: type=2000 audit(1414552835.515:1): initialized >Oct 29 11:20:35 unused kernel: HugeTLB registered 2 MB page size, pre-allocated 0 pages >Oct 29 11:20:35 unused kernel: zbud: loaded >Oct 29 11:20:35 unused kernel: VFS: Disk quotas dquot_6.5.2 >Oct 29 11:20:35 unused kernel: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) >Oct 29 11:20:35 unused kernel: msgmni has been set to 7580 >Oct 29 11:20:35 unused kernel: Key type big_key registered >Oct 29 11:20:35 unused kernel: alg: No test for stdrng (krng) >Oct 29 11:20:35 unused kernel: NET: Registered protocol family 38 >Oct 29 11:20:35 unused kernel: Key type asymmetric registered >Oct 29 11:20:35 unused kernel: Asymmetric key parser 'x509' registered >Oct 29 11:20:35 unused kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 252) >Oct 29 11:20:35 unused kernel: io scheduler noop registered >Oct 29 11:20:35 unused kernel: io scheduler deadline registered (default) >Oct 29 11:20:35 unused kernel: io scheduler cfq registered >Oct 29 11:20:35 unused kernel: pci_hotplug: PCI Hot Plug PCI Core version: 0.5 >Oct 29 11:20:35 unused kernel: pciehp: PCI Express Hot Plug Controller Driver version: 0.4 >Oct 29 11:20:35 unused kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 >Oct 29 11:20:35 unused kernel: ACPI: Power Button [PWRF] >Oct 29 11:20:35 unused kernel: GHES: HEST is not enabled! >Oct 29 11:20:35 unused kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled >Oct 29 11:20:35 unused kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A >Oct 29 11:20:35 unused kernel: Non-volatile memory driver v1.3 >Oct 29 11:20:35 unused kernel: Linux agpgart interface v0.103 >Oct 29 11:20:35 unused kernel: crash memory driver: version 1.1 >Oct 29 11:20:35 unused kernel: rdac: device handler registered >Oct 29 11:20:35 unused kernel: hp_sw: device handler registered >Oct 29 11:20:35 unused kernel: emc: device handler registered >Oct 29 11:20:35 unused kernel: alua: device handler registered >Oct 29 11:20:35 unused kernel: libphy: Fixed MDIO Bus: probed >Oct 29 11:20:35 unused kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver >Oct 29 11:20:35 unused kernel: ehci-pci: EHCI PCI platform driver >Oct 29 11:20:35 unused kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver >Oct 29 11:20:35 unused kernel: ohci-pci: OHCI PCI platform driver >Oct 29 11:20:35 unused kernel: uhci_hcd: USB Universal Host Controller Interface driver >Oct 29 11:20:35 unused kernel: uhci_hcd 0000:00:03.0: UHCI Host Controller >Oct 29 11:20:35 unused kernel: uhci_hcd 0000:00:03.0: new USB bus registered, assigned bus number 1 >Oct 29 11:20:35 unused kernel: uhci_hcd 0000:00:03.0: detected 2 ports >Oct 29 11:20:35 unused kernel: uhci_hcd 0000:00:03.0: irq 11, io base 0x0000c0a0 >Oct 29 11:20:35 unused kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001 >Oct 29 11:20:35 unused kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Oct 29 11:20:35 unused kernel: usb usb1: Product: UHCI Host Controller >Oct 29 11:20:35 unused kernel: usb usb1: Manufacturer: Linux 3.10.0-196.el7.x86_64 uhci_hcd >Oct 29 11:20:35 unused kernel: usb usb1: SerialNumber: 0000:00:03.0 >Oct 29 11:20:35 unused kernel: hub 1-0:1.0: USB hub found >Oct 29 11:20:35 unused kernel: hub 1-0:1.0: 2 ports detected >Oct 29 11:20:35 unused kernel: usbcore: registered new interface driver usbserial >Oct 29 11:20:35 unused kernel: usbcore: registered new interface driver usbserial_generic >Oct 29 11:20:35 unused kernel: usbserial: USB Serial support registered for generic >Oct 29 11:20:35 unused kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 >Oct 29 11:20:35 unused kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 >Oct 29 11:20:35 unused kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 >Oct 29 11:20:35 unused kernel: mousedev: PS/2 mouse device common for all mice >Oct 29 11:20:35 unused kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 >Oct 29 11:20:35 unused kernel: rtc_cmos 00:00: RTC can wake from S4 >Oct 29 11:20:35 unused kernel: rtc_cmos 00:00: rtc core: registered rtc_cmos as rtc0 >Oct 29 11:20:35 unused kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram >Oct 29 11:20:35 unused kernel: cpuidle: using governor menu >Oct 29 11:20:35 unused kernel: hidraw: raw HID events driver (C) Jiri Kosina >Oct 29 11:20:35 unused kernel: usbcore: registered new interface driver usbhid >Oct 29 11:20:35 unused kernel: usbhid: USB HID core driver >Oct 29 11:20:35 unused kernel: drop_monitor: Initializing network drop monitor service >Oct 29 11:20:35 unused kernel: TCP: cubic registered >Oct 29 11:20:35 unused kernel: Initializing XFRM netlink socket >Oct 29 11:20:35 unused kernel: NET: Registered protocol family 10 >Oct 29 11:20:35 unused kernel: NET: Registered protocol family 17 >Oct 29 11:20:35 unused kernel: Loading compiled-in X.509 certificates >Oct 29 11:20:35 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' >Oct 29 11:20:35 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' >Oct 29 11:20:35 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: 8c65d2217a39e9fa0bc841f8ba391e662cf68bcc' >Oct 29 11:20:35 unused kernel: registered taskstats version 1 >Oct 29 11:20:35 unused kernel: Key type trusted registered >Oct 29 11:20:35 unused kernel: Key type encrypted registered >Oct 29 11:20:35 unused kernel: IMA: No TPM chip found, activating TPM-bypass! >Oct 29 11:20:35 unused kernel: rtc_cmos 00:00: setting system clock to 2014-10-29 03:20:35 UTC (1414552835) >Oct 29 11:20:35 unused kernel: Freeing unused kernel memory: 1604k freed >Oct 29 11:20:35 unused systemd[1]: Unknown kernel switch systemd.debug. Ignoring. >Oct 29 11:20:35 unused systemd[1]: Supported kernel switches: >Oct 29 11:20:35 unused systemd[1]: systemd.unit=UNIT Default unit to start >Oct 29 11:20:35 unused systemd[1]: rd.systemd.unit=UNIT Default unit to start when run in initrd >Oct 29 11:20:35 unused systemd[1]: systemd.dump_core=0|1 Dump core on crash >Oct 29 11:20:35 unused systemd[1]: systemd.crash_shell=0|1 Run shell on crash >Oct 29 11:20:35 unused systemd[1]: systemd.crash_chvt=N Change to VT #N on crash >Oct 29 11:20:35 unused systemd[1]: systemd.confirm_spawn=0|1 Confirm every process spawn >Oct 29 11:20:35 unused systemd[1]: systemd.show_status=0|1 Show status updates on the console during bootup >Oct 29 11:20:35 unused systemd[1]: systemd.log_target=console|kmsg|journal|journal-or-kmsg|syslog|syslog-or-kmsg|null >Oct 29 11:20:35 unused systemd[1]: Log target >Oct 29 11:20:35 unused systemd[1]: systemd.log_level=LEVEL Log level >Oct 29 11:20:35 unused systemd[1]: systemd.log_color=0|1 Highlight important log messages >Oct 29 11:20:35 unused systemd[1]: systemd.log_location=0|1 Include code location in log messages >Oct 29 11:20:35 unused systemd[1]: systemd.default_standard_output=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 11:20:35 unused systemd[1]: Set default log output for services >Oct 29 11:20:35 unused systemd[1]: systemd.default_standard_error=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 11:20:35 unused systemd[1]: Set default log error output for services >Oct 29 11:20:35 unused systemd[1]: systemd.setenv=ASSIGNMENT Set an environment variable for all spawned processes >Oct 29 11:20:35 unused systemd[1]: systemd 208 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ) >Oct 29 11:20:35 unused systemd[1]: Detected virtualization 'kvm'. >Oct 29 11:20:35 unused systemd[1]: Running in initial RAM disk. >Oct 29 11:20:35 unused systemd[1]: Set hostname to <unused>. >Oct 29 11:20:35 unused systemd[1]: Expecting device dev-mapper-rhel_unused\x2droot.device... >Oct 29 11:20:35 unused systemd[1]: Starting -.slice. >Oct 29 11:20:35 unused systemd[1]: Created slice -.slice. >Oct 29 11:20:35 unused systemd[1]: Starting System Slice. >Oct 29 11:20:35 unused systemd[1]: Created slice System Slice. >Oct 29 11:20:35 unused systemd[1]: Starting Slices. >Oct 29 11:20:35 unused systemd[1]: Reached target Slices. >Oct 29 11:20:35 unused systemd[1]: Starting Timers. >Oct 29 11:20:35 unused systemd[1]: Reached target Timers. >Oct 29 11:20:35 unused systemd[1]: Starting Journal Socket. >Oct 29 11:20:35 unused systemd[1]: Listening on Journal Socket. >Oct 29 11:20:35 unused systemd[1]: Started dracut ask for additional cmdline parameters. >Oct 29 11:20:35 unused systemd[1]: Starting dracut cmdline hook... >Oct 29 11:20:35 unused systemd[1]: Started Load Kernel Modules. >Oct 29 11:20:35 unused systemd[1]: Starting Setup Virtual Console... >Oct 29 11:20:35 unused systemd[1]: Starting Journal Service... >Oct 29 11:20:35 unused systemd[1]: Started Journal Service. >Oct 29 11:20:35 unused journal: Journal started >Oct 29 11:20:35 unused systemd: Starting udev Kernel Socket. >Oct 29 11:20:35 unused dracut-cmdline: dracut-7.1 (Maipo) dracut-033-224.el7 >Oct 29 11:20:35 unused dracut-cmdline: Using kernel command line parameters: >Oct 29 11:20:35 unused systemd: Listening on udev Kernel Socket. >Oct 29 11:20:35 unused systemd: Starting udev Control Socket. >Oct 29 11:20:35 unused systemd: Listening on udev Control Socket. >Oct 29 11:20:35 unused systemd: Starting Sockets. >Oct 29 11:20:35 unused systemd: Reached target Sockets. >Oct 29 11:20:35 unused systemd: Starting Create list of required static device nodes for the current kernel... >Oct 29 11:20:35 unused systemd: Starting Apply Kernel Variables... >Oct 29 11:20:35 unused systemd: Starting Swap. >Oct 29 11:20:35 unused systemd: Reached target Swap. >Oct 29 11:20:35 unused systemd: Starting Local File Systems. >Oct 29 11:20:35 unused systemd: Reached target Local File Systems. >Oct 29 11:20:35 unused systemd: Started Apply Kernel Variables. >Oct 29 11:20:35 unused systemd: Started Create list of required static device nodes for the current kernel. >Oct 29 11:20:35 unused systemd: Starting Create static device nodes in /dev... >Oct 29 11:20:35 unused systemd: Started Create static device nodes in /dev. >Oct 29 11:20:35 unused systemd: Started dracut cmdline hook. >Oct 29 11:20:35 unused systemd: Starting dracut pre-udev hook... >Oct 29 11:20:35 unused systemd: Started Setup Virtual Console. >Oct 29 11:20:35 unused kernel: device-mapper: uevent: version 1.0.3 >Oct 29 11:20:35 unused kernel: device-mapper: ioctl: 4.27.0-ioctl (2013-10-30) initialised: dm-devel@redhat.com >Oct 29 11:20:35 unused kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd >Oct 29 11:20:35 unused systemd: Started dracut pre-udev hook. >Oct 29 11:20:35 unused systemd: Starting udev Kernel Device Manager... >Oct 29 11:20:35 unused systemd-udevd[259]: starting version 208 >Oct 29 11:20:35 unused systemd: Started udev Kernel Device Manager. >Oct 29 11:20:35 unused systemd: Started dracut pre-trigger hook. >Oct 29 11:20:35 unused systemd: Starting udev Coldplug all Devices... >Oct 29 11:20:35 unused systemd: Mounting Configuration File System... >Oct 29 11:20:35 unused systemd: Started udev Coldplug all Devices. >Oct 29 11:20:35 unused systemd: Starting dracut initqueue hook... >Oct 29 11:20:35 unused systemd: Starting Show Plymouth Boot Screen... >Oct 29 11:20:35 unused systemd: Mounted Configuration File System. >Oct 29 11:20:35 unused systemd: Starting System Initialization. >Oct 29 11:20:35 unused systemd: Reached target System Initialization. >Oct 29 11:20:35 unused kernel: FDC 0 is a S82078B >Oct 29 11:20:35 unused systemd: Started Show Plymouth Boot Screen. >Oct 29 11:20:35 unused systemd: Started Dispatch Password Requests to Console Directory Watch. >Oct 29 11:20:35 unused systemd: Starting Paths. >Oct 29 11:20:35 unused systemd: Reached target Paths. >Oct 29 11:20:35 unused systemd: Starting Forward Password Requests to Plymouth Directory Watch. >Oct 29 11:20:35 unused systemd: Started Forward Password Requests to Plymouth Directory Watch. >Oct 29 11:20:35 unused systemd: Starting Basic System. >Oct 29 11:20:35 unused systemd: Reached target Basic System. >Oct 29 11:20:35 unused kernel: e1000: Intel(R) PRO/1000 Network Driver - version 7.3.21-k8-NAPI >Oct 29 11:20:35 unused kernel: e1000: Copyright (c) 1999-2006 Intel Corporation. >Oct 29 11:20:35 unused kernel: [drm] Initialized drm 1.1.0 20060810 >Oct 29 11:20:35 unused kernel: ACPI: PCI Interrupt Link [LNKD] enabled at IRQ 10 >Oct 29 11:20:35 unused kernel: scsi host0: ata_piix >Oct 29 11:20:35 unused kernel: scsi host1: ata_piix >Oct 29 11:20:35 unused kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 >Oct 29 11:20:35 unused kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 >Oct 29 11:20:35 unused kernel: scsi host2: Virtio SCSI HBA >Oct 29 11:20:35 unused kernel: scsi 2:0:0:0: Direct-Access QEMU QEMU HARDDISK 2.1. PQ: 0 ANSI: 5 >Oct 29 11:20:35 unused kernel: scsi 2:0:1:0: CD-ROM QEMU QEMU CD-ROM 2.1. PQ: 0 ANSI: 5 >Oct 29 11:20:35 unused kernel: ACPI: PCI Interrupt Link [LNKA] enabled at IRQ 10 >Oct 29 11:20:35 unused kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001 >Oct 29 11:20:35 unused kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=5 >Oct 29 11:20:35 unused kernel: usb 1-1: Product: QEMU USB Tablet >Oct 29 11:20:35 unused kernel: usb 1-1: Manufacturer: QEMU >Oct 29 11:20:35 unused kernel: usb 1-1: SerialNumber: 42 >Oct 29 11:20:35 unused kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:03.0/usb1/1-1/1-1:1.0/input/input2 >Oct 29 11:20:35 unused kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Pointer [QEMU QEMU USB Tablet] on usb-0000:00:03.0-1/input0 >Oct 29 11:20:36 unused kernel: sr 2:0:1:0: [sr0] scsi3-mmc drive: 16x/50x cd/rw xa/form2 cdda tray >Oct 29 11:20:36 unused kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 >Oct 29 11:20:36 unused kernel: sd 2:0:0:0: [sda] 41943040 512-byte logical blocks: (21.4 GB/20.0 GiB) >Oct 29 11:20:36 unused kernel: sd 2:0:0:0: [sda] Write Protect is off >Oct 29 11:20:36 unused kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA >Oct 29 11:20:36 unused kernel: sda: sda1 sda2 >Oct 29 11:20:36 unused kernel: sd 2:0:0:0: [sda] Attached SCSI disk >Oct 29 11:20:36 unused kernel: e1000 0000:00:05.0 eth0: (PCI:33MHz:32-bit) 9a:4e:4f:50:51:52 >Oct 29 11:20:36 unused kernel: e1000 0000:00:05.0 eth0: Intel(R) PRO/1000 Network Connection >Oct 29 11:20:36 unused kernel: ACPI: PCI Interrupt Link [LNKB] enabled at IRQ 11 >Oct 29 11:20:36 unused kernel: [drm] Device Version 0.0 >Oct 29 11:20:36 unused kernel: [drm] Compression level 0 log level 0 >Oct 29 11:20:36 unused kernel: [drm] Currently using mode #0, list at 0x488 >Oct 29 11:20:36 unused kernel: [drm] 12286 io pages at offset 0x1000000 >Oct 29 11:20:36 unused kernel: [drm] 16777216 byte draw area at offset 0x0 >Oct 29 11:20:36 unused kernel: [drm] RAM header offset: 0x3ffe000 >Oct 29 11:20:36 unused kernel: [drm] rom modes offset 0x488 for 128 modes >Oct 29 11:20:36 unused kernel: [TTM] Zone kernel: Available graphics memory: 1941456 kiB >Oct 29 11:20:36 unused systemd-udevd[266]: renamed network interface eth0 to ens5 >Oct 29 11:20:36 unused kernel: [TTM] Initializing pool allocator >Oct 29 11:20:36 unused kernel: [TTM] Initializing DMA pool allocator >Oct 29 11:20:36 unused kernel: [drm] qxl: 16M of VRAM memory size >Oct 29 11:20:36 unused kernel: [drm] qxl: 63M of IO pages memory ready (VRAM domain) >Oct 29 11:20:36 unused kernel: [drm] qxl: 32M of Surface memory size >Oct 29 11:20:36 unused kernel: [drm] main mem slot 1 [f8000000,3ffe000] >Oct 29 11:20:36 unused kernel: [drm] surface mem slot 2 [fc000000,2000000] >Oct 29 11:20:36 unused kernel: [drm] fb mappable at 0xF8000000, size 3145728 >Oct 29 11:20:36 unused kernel: [drm] fb: depth 24, pitch 4096, width 1024, height 768 >Oct 29 11:20:36 unused kernel: fbcon: qxldrmfb (fb0) is primary device >Oct 29 11:20:36 unused kernel: tsc: Refined TSC clocksource calibration: 2000.002 MHz >Oct 29 11:20:36 unused kernel: Console: switching to colour frame buffer device 128x48 >Oct 29 11:20:36 unused kernel: qxl 0000:00:02.0: fb0: qxldrmfb frame buffer device >Oct 29 11:20:36 unused kernel: qxl 0000:00:02.0: registered panic notifier >Oct 29 11:20:36 unused kernel: [drm] Initialized qxl 0.1.0 20120117 for 0000:00:02.0 on minor 0 >Oct 29 11:20:36 unused dracut-initqueue: Scanning devices sda2 for LVM logical volumes rhel_unused/root rhel_unused/swap >Oct 29 11:20:36 unused dracut-initqueue: inactive '/dev/rhel_unused/swap' [2.00 GiB] inherit >Oct 29 11:20:36 unused dracut-initqueue: inactive '/dev/rhel_unused/root' [17.47 GiB] inherit >Oct 29 11:20:36 unused kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 >Oct 29 11:20:36 unused systemd: Found device /dev/mapper/rhel_unused-root. >Oct 29 11:20:36 unused systemd: Starting File System Check on /dev/mapper/rhel_unused-root... >Oct 29 11:20:36 unused systemd-fsck: /sbin/fsck.xfs: XFS file system. >Oct 29 11:20:36 unused systemd: Started File System Check on /dev/mapper/rhel_unused-root. >Oct 29 11:20:36 unused systemd: Started dracut initqueue hook. >Oct 29 11:20:36 unused systemd: Started dracut pre-mount hook. >Oct 29 11:20:36 unused systemd: Mounting /sysroot... >Oct 29 11:20:36 unused systemd: Starting Remote File Systems (Pre). >Oct 29 11:20:36 unused systemd: Reached target Remote File Systems (Pre). >Oct 29 11:20:36 unused systemd: Starting Remote File Systems. >Oct 29 11:20:36 unused systemd: Reached target Remote File Systems. >Oct 29 11:20:36 unused kernel: SGI XFS with ACLs, security attributes, large block/inode numbers, no debug enabled >Oct 29 11:20:36 unused kernel: XFS (dm-0): Mounting V4 Filesystem >Oct 29 11:20:36 unused kernel: XFS (dm-0): Ending clean mount >Oct 29 11:20:36 unused systemd: Mounted /sysroot. >Oct 29 11:20:36 unused systemd: Starting Initrd Root File System. >Oct 29 11:20:36 unused systemd: Reached target Initrd Root File System. >Oct 29 11:20:36 unused systemd: Starting Reload Configuration from the Real Root... >Oct 29 11:20:36 unused systemd: Reloading. >Oct 29 11:20:36 unused systemd: Started Reload Configuration from the Real Root. >Oct 29 11:20:36 unused systemd: Starting Initrd File Systems. >Oct 29 11:20:36 unused systemd: Reached target Initrd File Systems. >Oct 29 11:20:36 unused systemd: Started dracut mount hook. >Oct 29 11:20:36 unused systemd: Starting Initrd Default Target. >Oct 29 11:20:36 unused systemd: Reached target Initrd Default Target. >Oct 29 11:20:36 unused systemd: Starting dracut pre-pivot and cleanup hook... >Oct 29 11:20:36 unused systemd: Started dracut pre-pivot and cleanup hook. >Oct 29 11:20:36 unused systemd: Starting Cleaning Up and Shutting Down Daemons... >Oct 29 11:20:36 unused systemd: Stopping Cleaning Up and Shutting Down Daemons... >Oct 29 11:20:36 unused systemd: Starting Plymouth switch root service... >Oct 29 11:20:36 unused systemd: Stopped Cleaning Up and Shutting Down Daemons. >Oct 29 11:20:36 unused systemd: Stopping dracut pre-pivot and cleanup hook... >Oct 29 11:20:36 unused systemd: Stopped dracut pre-pivot and cleanup hook. >Oct 29 11:20:36 unused systemd: Stopping Remote File Systems. >Oct 29 11:20:36 unused systemd: Stopped target Remote File Systems. >Oct 29 11:20:36 unused systemd: Stopping Remote File Systems (Pre). >Oct 29 11:20:36 unused systemd: Stopped target Remote File Systems (Pre). >Oct 29 11:20:36 unused systemd: Stopping dracut initqueue hook... >Oct 29 11:20:36 unused systemd: Stopped dracut initqueue hook. >Oct 29 11:20:36 unused systemd: Stopping Initrd Default Target. >Oct 29 11:20:36 unused systemd: Stopped target Initrd Default Target. >Oct 29 11:20:36 unused systemd: Stopping Basic System. >Oct 29 11:20:36 unused systemd: Stopped target Basic System. >Oct 29 11:20:36 unused systemd: Stopping Slices. >Oct 29 11:20:36 unused systemd: Stopped target Slices. >Oct 29 11:20:36 unused systemd: Stopping Paths. >Oct 29 11:20:36 unused systemd: Stopped target Paths. >Oct 29 11:20:36 unused systemd: Stopping Timers. >Oct 29 11:20:36 unused systemd: Stopped target Timers. >Oct 29 11:20:36 unused systemd: Stopping Sockets. >Oct 29 11:20:36 unused systemd: Stopped target Sockets. >Oct 29 11:20:36 unused systemd: Stopping System Initialization. >Oct 29 11:20:36 unused systemd: Stopped target System Initialization. >Oct 29 11:20:36 unused systemd: Stopping Apply Kernel Variables... >Oct 29 11:20:36 unused systemd: Stopped Apply Kernel Variables. >Oct 29 11:20:36 unused systemd: Stopping udev Coldplug all Devices... >Oct 29 11:20:36 unused systemd: Stopped udev Coldplug all Devices. >Oct 29 11:20:36 unused systemd: Stopping Swap. >Oct 29 11:20:36 unused systemd: Stopped target Swap. >Oct 29 11:20:36 unused systemd: Stopping Local File Systems. >Oct 29 11:20:36 unused systemd: Stopped target Local File Systems. >Oct 29 11:20:36 unused systemd: Stopping udev Kernel Device Manager... >Oct 29 11:20:36 unused systemd: Stopped udev Kernel Device Manager. >Oct 29 11:20:36 unused systemd: Stopping dracut pre-udev hook... >Oct 29 11:20:36 unused systemd: Stopped dracut pre-udev hook. >Oct 29 11:20:36 unused systemd: Stopping dracut cmdline hook... >Oct 29 11:20:36 unused systemd: Stopped dracut cmdline hook. >Oct 29 11:20:36 unused systemd: Stopping Create static device nodes in /dev... >Oct 29 11:20:36 unused systemd: Stopped Create static device nodes in /dev. >Oct 29 11:20:36 unused systemd: Stopping Create list of required static device nodes for the current kernel... >Oct 29 11:20:36 unused systemd: Stopped Create list of required static device nodes for the current kernel. >Oct 29 11:20:36 unused systemd: Stopping udev Kernel Socket. >Oct 29 11:20:36 unused systemd: Closed udev Kernel Socket. >Oct 29 11:20:36 unused systemd: Stopping udev Control Socket. >Oct 29 11:20:36 unused systemd: Closed udev Control Socket. >Oct 29 11:20:36 unused systemd: Starting Cleanup udevd DB... >Oct 29 11:20:36 unused systemd: Started Cleanup udevd DB. >Oct 29 11:20:36 unused systemd: Starting Switch Root. >Oct 29 11:20:36 unused systemd: Reached target Switch Root. >Oct 29 11:20:36 unused systemd: Started Plymouth switch root service. >Oct 29 11:20:36 unused systemd: Starting Switch Root... >Oct 29 11:20:36 unused systemd: Switching root. >Oct 29 11:20:36 unused systemd-cgroups-agent: Failed to get D-Bus connection: Unknown error -1 >Oct 29 11:20:36 unused journal: Journal stopped >Oct 29 11:20:40 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:20:40 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:20:40 unused systemd-journald[110]: Received SIGTERM >Oct 29 11:20:40 unused kernel: type=1404 audit(1414552837.448:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 >Oct 29 11:20:40 unused kernel: type=1403 audit(1414552837.678:3): policy loaded auid=4294967295 ses=4294967295 >Oct 29 11:20:40 unused systemd[1]: Successfully loaded SELinux policy in 255.872ms. >Oct 29 11:20:40 unused systemd[1]: Relabelled /dev and /run in 21.507ms. >Oct 29 11:20:40 unused systemd[1]: Unknown kernel switch systemd.debug. Ignoring. >Oct 29 11:20:40 unused systemd[1]: Supported kernel switches: >Oct 29 11:20:40 unused systemd[1]: systemd.unit=UNIT Default unit to start >Oct 29 11:20:40 unused systemd[1]: rd.systemd.unit=UNIT Default unit to start when run in initrd >Oct 29 11:20:40 unused systemd[1]: systemd.dump_core=0|1 Dump core on crash >Oct 29 11:20:40 unused systemd[1]: systemd.crash_shell=0|1 Run shell on crash >Oct 29 11:20:40 unused systemd[1]: systemd.crash_chvt=N Change to VT #N on crash >Oct 29 11:20:40 unused systemd[1]: systemd.confirm_spawn=0|1 Confirm every process spawn >Oct 29 11:20:40 unused systemd[1]: systemd.show_status=0|1 Show status updates on the console during bootup >Oct 29 11:20:40 unused systemd[1]: systemd.log_target=console|kmsg|journal|journal-or-kmsg|syslog|syslog-or-kmsg|null >Oct 29 11:20:40 unused systemd[1]: Log target >Oct 29 11:20:40 unused systemd[1]: systemd.log_level=LEVEL Log level >Oct 29 11:20:40 unused systemd[1]: systemd.log_color=0|1 Highlight important log messages >Oct 29 11:20:40 unused systemd[1]: systemd.log_location=0|1 Include code location in log messages >Oct 29 11:20:40 unused systemd[1]: systemd.default_standard_output=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 11:20:40 unused systemd[1]: Set default log output for services >Oct 29 11:20:40 unused systemd[1]: systemd.default_standard_error=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 11:20:40 unused systemd[1]: Set default log error output for services >Oct 29 11:20:40 unused systemd[1]: systemd.setenv=ASSIGNMENT Set an environment variable for all spawned processes >Oct 29 11:20:40 unused journal: Journal started >Oct 29 11:20:40 unused systemd: systemd 208 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ) >Oct 29 11:20:40 unused systemd: Detected virtualization 'kvm'. >Oct 29 11:20:40 unused systemd: Set hostname to <unused>. >Oct 29 11:20:40 unused systemd: /usr/lib/systemd/system-generators/anaconda-generator exited with exit status 1. >Oct 29 11:20:40 unused systemd: [/usr/lib/systemd/system/lvm2-lvmetad.socket:9] Unknown lvalue 'RemoveOnStop' in section 'Socket' >Oct 29 11:20:40 unused systemd: [/usr/lib/systemd/system/dm-event.socket:10] Unknown lvalue 'RemoveOnStop' in section 'Socket' >Oct 29 11:20:40 unused systemd: Started Remount Root and Kernel File Systems. >Oct 29 11:20:40 unused systemd: Started Create list of required static device nodes for the current kernel. >Oct 29 11:20:40 unused systemd: Started udev Coldplug all Devices. >Oct 29 11:20:40 unused systemd: Starting udev Wait for Complete Device Initialization... >Oct 29 11:20:40 unused systemd: Starting Create static device nodes in /dev... >Oct 29 11:20:40 unused systemd: Starting Import network configuration from initramfs... >Oct 29 11:20:41 unused systemd: Starting Configure read-only root support... >Oct 29 11:20:41 unused systemd: Starting Load/Save Random Seed... >Oct 29 11:20:41 unused systemd: Starting LVM2 metadata daemon... >Oct 29 11:20:41 unused systemd: Started LVM2 metadata daemon. >Oct 29 11:20:41 unused systemd: Started Load/Save Random Seed. >Oct 29 11:20:42 unused systemd: Started Import network configuration from initramfs. >Oct 29 11:20:42 unused lvm: 2 logical volume(s) in volume group "rhel_unused" monitored >Oct 29 11:20:42 unused systemd: Started Configure read-only root support. >Oct 29 11:20:42 unused systemd: Started Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. >Oct 29 11:20:42 unused systemd: Started Create static device nodes in /dev. >Oct 29 11:20:42 unused systemd: Starting udev Kernel Device Manager... >Oct 29 11:20:42 unused systemd: Starting Local File Systems (Pre). >Oct 29 11:20:42 unused systemd-udevd[534]: starting version 208 >Oct 29 11:20:42 unused systemd: Reached target Local File Systems (Pre). >Oct 29 11:20:42 unused systemd: Started udev Kernel Device Manager. >Oct 29 11:20:44 unused systemd: Started udev Wait for Complete Device Initialization. >Oct 29 11:20:44 unused systemd: Starting Activation of DM RAID sets... >Oct 29 11:20:45 unused kernel: input: PC Speaker as /devices/platform/pcspkr/input/input4 >Oct 29 11:20:45 unused systemd: Found device /dev/ttyS0. >Oct 29 11:20:45 unused kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 >Oct 29 11:20:45 unused kernel: ppdev: user-space parallel port driver >Oct 29 11:20:45 unused kernel: alg: No test for __gcm-aes-aesni (__driver-gcm-aes-aesni) >Oct 29 11:20:45 unused mtp-probe: checking bus 1, device 2: "/sys/devices/pci0000:00/0000:00:03.0/usb1/1-1" >Oct 29 11:20:45 unused mtp-probe: bus: 1, device: 2 was not an MTP device >Oct 29 11:20:45 unused systemd: Started Activation of DM RAID sets. >Oct 29 11:20:45 unused systemd: Starting Encrypted Volumes. >Oct 29 11:20:45 unused systemd: Reached target Encrypted Volumes. >Oct 29 11:20:45 unused kernel: alg: No test for crc32 (crc32-pclmul) >Oct 29 11:20:46 unused systemd: Starting LVM2 PV scan on device 8:2... >Oct 29 11:20:46 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 29 11:20:46 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 29 11:20:46 unused lvm: 2 logical volume(s) in volume group "rhel_unused" now active >Oct 29 11:20:46 unused systemd: Found device /dev/mapper/rhel_unused-swap. >Oct 29 11:20:46 unused systemd: Activating swap /dev/mapper/rhel_unused-swap... >Oct 29 11:20:46 unused systemd: Started LVM2 PV scan on device 8:2. >Oct 29 11:20:46 unused systemd: Found device QEMU_HARDDISK. >Oct 29 11:20:46 unused systemd: Mounting /boot... >Oct 29 11:20:46 unused kernel: Adding 2097148k swap on /dev/mapper/rhel_unused-swap. Priority:-1 extents:1 across:2097148k FS >Oct 29 11:20:46 unused kernel: XFS (sda1): Mounting V4 Filesystem >Oct 29 11:20:46 unused systemd: Activated swap /dev/mapper/rhel_unused-swap. >Oct 29 11:20:46 unused systemd: Starting Swap. >Oct 29 11:20:46 unused systemd: Reached target Swap. >Oct 29 11:20:59 unused kernel: XFS (sda1): Ending clean mount >Oct 29 11:20:59 unused systemd: Mounted /boot. >Oct 29 11:20:59 unused systemd: Starting Local File Systems. >Oct 29 11:20:59 unused systemd: Reached target Local File Systems. >Oct 29 11:20:59 unused systemd: Started Mark the need to relabel after reboot. >Oct 29 11:20:59 unused systemd: Started Relabel all filesystems, if necessary. >Oct 29 11:20:59 unused systemd: Started Reconfigure the system on administrator request. >Oct 29 11:20:59 unused systemd: Starting Create Volatile Files and Directories... >Oct 29 11:20:59 unused systemd: Starting Tell Plymouth To Write Out Runtime Data... >Oct 29 11:21:00 unused systemd: Started Create Volatile Files and Directories. >Oct 29 11:21:00 unused systemd: Starting Security Auditing Service... >Oct 29 11:21:00 unused systemd: Started Tell Plymouth To Write Out Runtime Data. >Oct 29 11:21:00 unused auditd[619]: Started dispatcher: /sbin/audispd pid: 631 >Oct 29 11:21:00 unused augenrules: /sbin/augenrules: No change >Oct 29 11:21:00 unused kernel: type=1305 audit(1414552860.257:4): audit_pid=619 old=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 >Oct 29 11:21:00 unused audispd: audispd initialized with q_depth=150 and 1 active plugins >Oct 29 11:21:00 unused auditd[619]: Init complete, auditd 2.4 listening for events (startup state enable) >Oct 29 11:21:00 unused augenrules: No rules >Oct 29 11:21:00 unused augenrules: enabled 1 >Oct 29 11:21:00 unused augenrules: flag 1 >Oct 29 11:21:00 unused augenrules: pid 619 >Oct 29 11:21:00 unused augenrules: rate_limit 0 >Oct 29 11:21:00 unused augenrules: backlog_limit 320 >Oct 29 11:21:00 unused augenrules: lost 0 >Oct 29 11:21:00 unused augenrules: backlog 1 >Oct 29 11:21:00 unused systemd: Started Security Auditing Service. >Oct 29 11:21:00 unused systemd: Starting Update UTMP about System Reboot/Shutdown... >Oct 29 11:21:00 unused systemd: Started Update UTMP about System Reboot/Shutdown. >Oct 29 11:21:00 unused systemd: Starting System Initialization. >Oct 29 11:21:00 unused systemd: Reached target System Initialization. >Oct 29 11:21:01 unused systemd: Starting Daily Cleanup of Temporary Directories. >Oct 29 11:21:01 unused systemd: Started Daily Cleanup of Temporary Directories. >Oct 29 11:21:01 unused systemd: Starting Timers. >Oct 29 11:21:01 unused systemd: Reached target Timers. >Oct 29 11:21:01 unused systemd: Starting Open-iSCSI iscsid Socket. >Oct 29 11:21:01 unused systemd: Listening on Open-iSCSI iscsid Socket. >Oct 29 11:21:01 unused systemd: Starting Open-iSCSI iscsiuio Socket. >Oct 29 11:21:01 unused systemd: Listening on Open-iSCSI iscsiuio Socket. >Oct 29 11:21:01 unused systemd: Starting RPCbind Server Activation Socket. >Oct 29 11:21:01 unused systemd: Listening on RPCbind Server Activation Socket. >Oct 29 11:21:01 unused systemd: Starting Avahi mDNS/DNS-SD Stack Activation Socket. >Oct 29 11:21:01 unused systemd: Listening on Avahi mDNS/DNS-SD Stack Activation Socket. >Oct 29 11:21:01 unused systemd: Starting Flexible branding. >Oct 29 11:21:01 unused systemd: Started Flexible branding. >Oct 29 11:21:01 unused systemd: Starting Paths. >Oct 29 11:21:01 unused systemd: Reached target Paths. >Oct 29 11:21:01 unused systemd: Starting D-Bus System Message Bus Socket. >Oct 29 11:21:01 unused systemd: Listening on D-Bus System Message Bus Socket. >Oct 29 11:21:01 unused systemd: Starting Sockets. >Oct 29 11:21:01 unused systemd: Reached target Sockets. >Oct 29 11:21:01 unused systemd: Starting Basic System. >Oct 29 11:21:01 unused systemd: Reached target Basic System. >Oct 29 11:21:01 unused systemd: Starting firewalld - dynamic firewall daemon... >Oct 29 11:21:02 unused systemd: Started Load CPU microcode update. >Oct 29 11:21:02 unused systemd: Starting Dump dmesg to /var/log/dmesg... >Oct 29 11:21:02 unused systemd: Started Software RAID monitoring and management. >Oct 29 11:21:02 unused systemd: Starting libstoragemgmt plug-in server daemon... >Oct 29 11:21:02 unused systemd: Started libstoragemgmt plug-in server daemon. >Oct 29 11:21:02 unused systemd: Starting Avahi mDNS/DNS-SD Stack... >Oct 29 11:21:02 unused systemd: Starting NTP client/server... >Oct 29 11:21:03 unused systemd: Starting Kernel Samepage Merging... >Oct 29 11:21:03 unused systemd: Starting Rollback uncommitted netcf network config change transactions... >Oct 29 11:21:03 unused systemd: Starting System Logging Service... >Oct 29 11:21:03 unused systemd: Starting Resets System Activity Logs... >Oct 29 11:21:03 unused systemd: Starting Self Monitoring and Reporting Technology (SMART) Daemon... >Oct 29 11:21:03 unused netcf-transaction.sh: Running start: No pending transaction to rollback >Oct 29 11:21:03 unused avahi-daemon[649]: Found user 'avahi' (UID 70) and group 'avahi' (GID 70). >Oct 29 11:21:03 unused avahi-daemon[649]: Successfully dropped root privileges. >Oct 29 11:21:03 unused avahi-daemon[649]: avahi-daemon 0.6.31 starting up. >Oct 29 11:21:03 unused avahi-daemon[649]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns! >Oct 29 11:21:04 unused systemd: Started Self Monitoring and Reporting Technology (SMART) Daemon. >Oct 29 11:21:04 unused systemd: Starting Dynamic System Tuning Daemon... >Oct 29 11:21:04 unused systemd: Starting Hardware RNG Entropy Gatherer Daemon... >Oct 29 11:21:04 unused systemd: Started Hardware RNG Entropy Gatherer Daemon. >Oct 29 11:21:04 unused systemd: Started OpenSSH Server Key Generation. >Oct 29 11:21:04 unused systemd: Starting irqbalance daemon... >Oct 29 11:21:04 unused rngd: Unable to open file: /dev/tpm0 >Oct 29 11:21:04 unused rngd: can't open any entropy source >Oct 29 11:21:04 unused rngd: Maybe RNG device modules are not loaded >Oct 29 11:21:04 unused systemd: Started irqbalance daemon. >Oct 29 11:21:04 unused systemd: Starting Login Service... >Oct 29 11:21:05 unused systemd: Starting Accounts Service... >Oct 29 11:21:05 unused systemd: Starting RealtimeKit Scheduling Policy Service... >Oct 29 11:21:05 unused smartd[658]: smartd 6.2 2013-07-26 r3841 [x86_64-linux-3.10.0-196.el7.x86_64] (local build) >Oct 29 11:21:05 unused smartd[658]: Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org >Oct 29 11:21:05 unused smartd[658]: Opened configuration file /etc/smartmontools/smartd.conf >Oct 29 11:21:05 unused smartd[658]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices >Oct 29 11:21:05 unused smartd[658]: Device: /dev/sda, opened >Oct 29 11:21:05 unused smartd[658]: Device: /dev/sda, [QEMU QEMU HARDDISK 2.1.], 21.4 GB >Oct 29 11:21:05 unused chronyd[671]: chronyd version 1.29.1 starting >Oct 29 11:21:06 unused smartd[658]: Device: /dev/sda, Bad IEC (SMART) mode page, err=5, skip device >Oct 29 11:21:06 unused smartd[658]: Monitoring 0 ATA and 0 SCSI devices >Oct 29 11:21:06 unused chronyd[671]: Linux kernel major=3 minor=10 patch=0 >Oct 29 11:21:06 unused chronyd[671]: hz=100 shift_hz=7 freq_scale=1.00000000 nominal_tick=10000 slew_delta_tick=833 max_tick_bias=1000 shift_pll=2 >Oct 29 11:21:06 unused chronyd[671]: Frequency 1.215 +/- 0.198 ppm read from /var/lib/chrony/drift >Oct 29 11:21:06 unused systemd: Starting D-Bus System Message Bus... >Oct 29 11:21:06 unused systemd: Started D-Bus System Message Bus. >Oct 29 11:21:06 unused systemd: Started Dump dmesg to /var/log/dmesg. >Oct 29 11:21:06 unused systemd: Started Kernel Samepage Merging. >Oct 29 11:21:06 unused systemd: Started Rollback uncommitted netcf network config change transactions. >Oct 29 11:21:06 unused systemd: Started Resets System Activity Logs. >Oct 29 11:21:06 unused systemd: rngd.service: main process exited, code=exited, status=1/FAILURE >Oct 29 11:21:06 unused systemd: Unit rngd.service entered failed state. >Oct 29 11:21:06 unused systemd: Starting Kernel Samepage Merging (KSM) Tuning Daemon... >Oct 29 11:21:06 unused systemd: Started System Logging Service. >Oct 29 11:21:07 unused systemd: Started Kernel Samepage Merging (KSM) Tuning Daemon. >Oct 29 11:21:07 unused systemd: Started NTP client/server. >Oct 29 11:21:09 unused dbus-daemon: dbus[676]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:21:09 unused dbus[676]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:21:09 unused avahi-daemon[649]: Successfully called chroot(). >Oct 29 11:21:09 unused avahi-daemon[649]: Successfully dropped remaining capabilities. >Oct 29 11:21:09 unused avahi-daemon[649]: No service file found in /etc/avahi/services. >Oct 29 11:21:09 unused systemd: Started Avahi mDNS/DNS-SD Stack. >Oct 29 11:21:09 unused systemd: Started RealtimeKit Scheduling Policy Service. >Oct 29 11:21:09 unused systemd-logind: New seat seat0. >Oct 29 11:21:09 unused avahi-daemon[649]: Network interface enumeration completed. >Oct 29 11:21:09 unused avahi-daemon[649]: Registering HINFO record with values 'X86_64'/'LINUX'. >Oct 29 11:21:09 unused avahi-daemon[649]: Server startup complete. Host name is unused.local. Local service cookie is 2586279506. >Oct 29 11:21:09 unused systemd: Started Login Service. >Oct 29 11:21:09 unused systemd-logind: Watching system buttons on /dev/input/event0 (Power Button) >Oct 29 11:21:09 unused dbus-daemon: dbus[676]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Oct 29 11:21:09 unused dbus[676]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Oct 29 11:21:09 unused systemd: Starting Authorization Manager... >Oct 29 11:21:10 unused polkitd[714]: Started polkitd version 0.112 >Oct 29 11:21:10 unused dbus-daemon: dbus[676]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Oct 29 11:21:10 unused dbus[676]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Oct 29 11:21:10 unused systemd: Started Authorization Manager. >Oct 29 11:21:10 unused accounts-daemon[669]: started daemon version 0.6.35 >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused systemd: Started Accounts Service. >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused systemd: Started Dynamic System Tuning Daemon. >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused kernel: ip_tables: (C) 2000-2006 Netfilter Core Team >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused kernel: nf_conntrack version 0.5.0 (16384 buckets, 65536 max) >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:11 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused kernel: Ebtables v2.0 registered >Oct 29 11:21:12 unused kernel: Bridge firewalling registered >Oct 29 11:21:12 unused systemd: Started firewalld - dynamic firewall daemon. >Oct 29 11:21:12 unused systemd: Starting Network Manager... >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:12 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused NetworkManager[796]: <info> NetworkManager (version 0.9.9.1-42.git20140326.4dba720.el7) is starting... >Oct 29 11:21:13 unused NetworkManager[796]: <info> Read config: /etc/NetworkManager/NetworkManager.conf and conf.d: 10-ibft-plugin.conf, 00-server.conf >Oct 29 11:21:13 unused NetworkManager[796]: <info> WEXT support is disabled >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused kernel: cfg80211: Calling CRDA to update world regulatory domain >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused NetworkManager[796]: <info> VPN: loaded org.freedesktop.NetworkManager.libreswan >Oct 29 11:21:13 unused kernel: cfg80211: World regulatory domain updated: >Oct 29 11:21:13 unused kernel: cfg80211: DFS Master region: unset >Oct 29 11:21:13 unused kernel: cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time) >Oct 29 11:21:13 unused kernel: cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:21:13 unused kernel: cfg80211: (2457000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:21:13 unused kernel: cfg80211: (2474000 KHz - 2494000 KHz @ 20000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:21:13 unused kernel: cfg80211: (5170000 KHz - 5250000 KHz @ 160000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:21:13 unused kernel: cfg80211: (5250000 KHz - 5330000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s) >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused kernel: cfg80211: (5490000 KHz - 5730000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s) >Oct 29 11:21:13 unused kernel: cfg80211: (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:21:13 unused kernel: cfg80211: (57240000 KHz - 63720000 KHz @ 2160000 KHz), (N/A, 0 mBm), (N/A) >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:13 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused NetworkManager[796]: ifcfg-rh: Acquired D-Bus service com.redhat.ifcfgrh1 >Oct 29 11:21:14 unused NetworkManager[796]: <info> Loaded plugin ifcfg-rh: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused NetworkManager[796]: <info> Loaded plugin iBFT: (c) 2014 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 11:21:14 unused NetworkManager[796]: <info> Loaded plugin keyfile: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused NetworkManager[796]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:21:14 unused NetworkManager[796]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-ens5 ... >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused NetworkManager[796]: ifcfg-rh: read connection 'ens5' >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:14 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused NetworkManager[796]: <info> monitoring kernel firmware directory '/lib/firmware'. >Oct 29 11:21:15 unused NetworkManager[796]: <info> WiFi hardware radio set enabled >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused NetworkManager[796]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-adsl.so >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused NetworkManager[796]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-bluetooth.so >Oct 29 11:21:15 unused NetworkManager[796]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-wwan.so >Oct 29 11:21:15 unused NetworkManager[796]: <info> WiFi enabled by radio killswitch; enabled by state file >Oct 29 11:21:15 unused NetworkManager[796]: <info> WWAN enabled by radio killswitch; enabled by state file >Oct 29 11:21:15 unused NetworkManager[796]: <info> WiMAX enabled by radio killswitch; enabled by state file >Oct 29 11:21:15 unused NetworkManager[796]: <info> Networking is enabled by state file >Oct 29 11:21:15 unused NetworkManager[796]: <info> (lo): link connected >Oct 29 11:21:15 unused NetworkManager[796]: <info> (lo): carrier is ON (but ignored) >Oct 29 11:21:15 unused NetworkManager[796]: <info> (lo): new Generic device (driver: 'unknown' ifindex: 1) >Oct 29 11:21:15 unused NetworkManager[796]: <info> (lo): exported as /org/freedesktop/NetworkManager/Devices/0 >Oct 29 11:21:15 unused NetworkManager[796]: <info> (ens5): carrier is OFF (but ignored) >Oct 29 11:21:15 unused NetworkManager[796]: <info> (ens5): new Ethernet device (driver: 'e1000' ifindex: 2) >Oct 29 11:21:15 unused NetworkManager[796]: <info> (ens5): exported as /org/freedesktop/NetworkManager/Devices/1 >Oct 29 11:21:15 unused NetworkManager[796]: <info> (ens5): device state change: unmanaged -> unavailable (reason 'managed') [10 20 2] >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused systemd: Started Network Manager. >Oct 29 11:21:15 unused systemd: Starting LSB: Bring up/down networking... >Oct 29 11:21:15 unused NetworkManager[796]: <info> (ens5): preparing device >Oct 29 11:21:15 unused NetworkManager[796]: <info> (ens5): device state change: unavailable -> disconnected (reason 'none') [20 30 0] >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused kernel: IPv6: ADDRCONF(NETDEV_UP): ens5: link is not ready >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused dbus-daemon: dbus[676]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:21:15 unused dbus[676]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused NetworkManager[796]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused network: Bringing up loopback interface: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:15 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused NetworkManager[796]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:21:16 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused NetworkManager[796]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:21:16 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused NetworkManager[796]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:21:16 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused network: [ OK ] >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused NetworkManager[796]: <warn> Failed to activate 'ens5': Connection 'ens5' is not available on the device ens5 at this time. >Oct 29 11:21:16 unused NetworkManager[796]: <info> NetworkManager state is now DISCONNECTING >Oct 29 11:21:16 unused NetworkManager[796]: <info> NetworkManager state is now DISCONNECTED >Oct 29 11:21:16 unused network: Bringing up interface ens5: Error: Connection activation failed: Connection 'ens5' is not available on the device ens5 at this time. >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused network: [FAILED] >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused systemd: network.service: control process exited, code=exited status=1 >Oct 29 11:21:16 unused systemd: Failed to start LSB: Bring up/down networking. >Oct 29 11:21:16 unused systemd: Unit network.service entered failed state. >Oct 29 11:21:16 unused systemd: Starting Network. >Oct 29 11:21:16 unused systemd: Reached target Network. >Oct 29 11:21:16 unused systemd: Started Login and scanning of iSCSI devices. >Oct 29 11:21:16 unused systemd: Starting Remote File Systems (Pre). >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused systemd: Reached target Remote File Systems (Pre). >Oct 29 11:21:16 unused systemd: Starting Remote File Systems. >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused systemd: Reached target Remote File Systems. >Oct 29 11:21:16 unused systemd: Starting Trigger Flushing of Journal to Persistent Storage... >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused systemd: Starting Virtualization daemon... >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused systemd: Starting Enable periodic update of entitlement certificates.... >Oct 29 11:21:16 unused systemd: Starting Crash recovery kernel arming... >Oct 29 11:21:16 unused systemd: Starting Postfix Mail Transport Agent... >Oct 29 11:21:16 unused systemd: Starting OpenSSH server daemon... >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused systemd: Started OpenSSH server daemon. >Oct 29 11:21:16 unused systemd: Starting /etc/rc.d/rc.local Compatibility... >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused systemd: Starting LSB: Starts the Spacewalk Daemon... >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:16 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused systemd: Started Enable periodic update of entitlement certificates.. >Oct 29 11:21:17 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused systemd: Started Trigger Flushing of Journal to Persistent Storage. >Oct 29 11:21:17 unused systemd: Starting Permit User Sessions... >Oct 29 11:21:17 unused rc.local: ens5: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500 >Oct 29 11:21:17 unused rc.local: ether 9a:4e:4f:50:51:52 txqueuelen 1000 (Ethernet) >Oct 29 11:21:17 unused rc.local: RX packets 221 bytes 13443 (13.1 KiB) >Oct 29 11:21:17 unused rc.local: RX errors 0 dropped 0 overruns 0 frame 0 >Oct 29 11:21:17 unused rc.local: TX packets 0 bytes 0 (0.0 B) >Oct 29 11:21:17 unused rc.local: TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >Oct 29 11:21:17 unused rc.local: lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 >Oct 29 11:21:17 unused rc.local: inet 127.0.0.1 netmask 255.0.0.0 >Oct 29 11:21:17 unused rc.local: inet6 ::1 prefixlen 128 scopeid 0x10<host> >Oct 29 11:21:17 unused rc.local: loop txqueuelen 0 (Local Loopback) >Oct 29 11:21:17 unused rc.local: RX packets 12 bytes 1296 (1.2 KiB) >Oct 29 11:21:17 unused rc.local: RX errors 0 dropped 0 overruns 0 frame 0 >Oct 29 11:21:17 unused rc.local: TX packets 12 bytes 1296 (1.2 KiB) >Oct 29 11:21:17 unused rc.local: TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused systemd: Started /etc/rc.d/rc.local Compatibility. >Oct 29 11:21:17 unused systemd: PID file /var/run/rhnsd.pid not readable (yet?) after start. >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused systemd: Failed to start LSB: Starts the Spacewalk Daemon. >Oct 29 11:21:17 unused systemd: Unit rhnsd.service entered failed state. >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused systemd: Started Permit User Sessions. >Oct 29 11:21:17 unused systemd: Starting Command Scheduler... >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused NetworkManager[796]: <info> (ens5): link connected >Oct 29 11:21:17 unused NetworkManager[796]: <info> Auto-activating connection 'ens5'. >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused NetworkManager[796]: <info> Activation (ens5) starting connection 'ens5' >Oct 29 11:21:17 unused NetworkManager[796]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) scheduled... >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused NetworkManager[796]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) started... >Oct 29 11:21:17 unused NetworkManager[796]: <info> (ens5): device state change: disconnected -> prepare (reason 'none') [30 40 0] >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused NetworkManager[796]: <info> NetworkManager state is now CONNECTING >Oct 29 11:21:17 unused NetworkManager[796]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) scheduled... >Oct 29 11:21:17 unused NetworkManager[796]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) complete. >Oct 29 11:21:17 unused NetworkManager[796]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) starting... >Oct 29 11:21:17 unused NetworkManager[796]: <info> (ens5): device state change: prepare -> config (reason 'none') [40 50 0] >Oct 29 11:21:17 unused NetworkManager[796]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) successful. >Oct 29 11:21:17 unused NetworkManager[796]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) complete. >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:17 unused audispd: queue is full - dropping event >Oct 29 11:21:18 unused systemd: Started Command Scheduler. >Oct 29 11:21:18 unused systemd: Starting Job spooling tools... >Oct 29 11:21:18 unused systemd: Started Job spooling tools. >Oct 29 11:21:18 unused systemd: Starting GNOME Display Manager... >Oct 29 11:21:18 unused systemd: Starting Wait for Plymouth Boot Screen to Quit... >Oct 29 11:21:18 unused kernel: e1000: ens5 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX >Oct 29 11:21:18 unused libvirtd: 2014-10-29 03:21:18.107+0000: 1280: info : libvirt version: 1.2.8, package: 4.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2014-09-26-08:45:32, x86-021.build.eng.bos.redhat.com) >Oct 29 11:21:18 unused libvirtd: 2014-10-29 03:21:18.107+0000: 1280: warning : virGetHostname:665 : getaddrinfo failed for 'unused': Name or service not known >Oct 29 11:21:18 unused kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens5: link becomes ready >Oct 29 11:21:18 unused systemd: Started GNOME Display Manager. >Oct 29 11:21:18 unused dbus-daemon: dbus[676]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.17" (uid=0 pid=1817 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.18" (uid=0 pid=1941 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Oct 29 11:21:18 unused dbus[676]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.17" (uid=0 pid=1817 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.18" (uid=0 pid=1941 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Oct 29 11:21:18 unused kdumpctl: No kdump initial ramdisk found. >Oct 29 11:21:18 unused kdumpctl: Rebuilding /boot/initramfs-3.10.0-196.el7.x86_64kdump.img >Oct 29 11:21:18 unused setroubleshoot: Plugin Exception restorecon >Oct 29 11:21:18 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:21:19 unused journal: libvirt version: 1.2.8, package: 4.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2014-09-26-08:45:32, x86-021.build.eng.bos.redhat.com) >Oct 29 11:21:19 unused journal: Module /usr/lib64/libvirt/connection-driver/libvirt_driver_lxc.so not accessible >Oct 29 11:21:19 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:19 unused NetworkManager[796]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) scheduled. >Oct 29 11:21:19 unused NetworkManager[796]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) started... >Oct 29 11:21:19 unused NetworkManager[796]: <info> (ens5): device state change: config -> ip-config (reason 'none') [50 70 0] >Oct 29 11:21:19 unused NetworkManager[796]: <info> Activation (ens5) Beginning DHCPv4 transaction (timeout in 45 seconds) >Oct 29 11:21:19 unused systemd: Started Virtualization daemon. >Oct 29 11:21:19 unused NetworkManager[796]: <info> dhclient started with pid 2706 >Oct 29 11:21:19 unused NetworkManager[796]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) complete. >Oct 29 11:21:19 unused systemd: Started Postfix Mail Transport Agent. >Oct 29 11:21:19 unused NetworkManager[796]: <info> (ens5): DHCPv4 state changed nbi -> preinit >Oct 29 11:21:19 unused setroubleshoot: Plugin Exception restorecon_source >Oct 29 11:21:19 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:21:19 unused dhclient[2706]: DHCPREQUEST on ens5 to 255.255.255.255 port 67 (xid=0x3bf2ac5b) >Oct 29 11:21:19 unused dhclient[2706]: DHCPACK from 10.66.111.254 (xid=0x3bf2ac5b) >Oct 29 11:21:19 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:19 unused NetworkManager[796]: <info> (ens5): DHCPv4 state changed preinit -> reboot >Oct 29 11:21:19 unused NetworkManager[796]: <info> address 10.66.110.85 >Oct 29 11:21:19 unused NetworkManager[796]: <info> plen 21 (255.255.248.0) >Oct 29 11:21:19 unused NetworkManager[796]: <info> gateway 10.66.111.254 >Oct 29 11:21:19 unused NetworkManager[796]: <info> server identifier 10.66.78.111 >Oct 29 11:21:19 unused NetworkManager[796]: <info> lease time 14400 >Oct 29 11:21:19 unused NetworkManager[796]: <info> nameserver '10.66.78.111' >Oct 29 11:21:19 unused NetworkManager[796]: <info> nameserver '10.66.78.117' >Oct 29 11:21:19 unused NetworkManager[796]: <info> nameserver '10.66.127.10' >Oct 29 11:21:19 unused NetworkManager[796]: <info> domain name 'englab.nay.redhat.com' >Oct 29 11:21:19 unused NetworkManager[796]: <info> domain name 'qe.lab.eng.nay.redhat.com' >Oct 29 11:21:19 unused NetworkManager[796]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Configure Commit) scheduled... >Oct 29 11:21:19 unused NetworkManager[796]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Commit) started... >Oct 29 11:21:19 unused NetworkManager[796]: <info> (ens5): device state change: ip-config -> ip-check (reason 'none') [70 80 0] >Oct 29 11:21:19 unused NetworkManager[796]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Commit) complete. >Oct 29 11:21:19 unused avahi-daemon[649]: Joining mDNS multicast group on interface ens5.IPv4 with address 10.66.110.85. >Oct 29 11:21:19 unused NetworkManager[796]: <info> (ens5): device state change: ip-check -> secondaries (reason 'none') [80 90 0] >Oct 29 11:21:19 unused NetworkManager[796]: <info> (ens5): device state change: secondaries -> activated (reason 'none') [90 100 0] >Oct 29 11:21:19 unused NetworkManager[796]: <info> NetworkManager state is now CONNECTED_LOCAL >Oct 29 11:21:19 unused avahi-daemon[649]: New relevant interface ens5.IPv4 for mDNS. >Oct 29 11:21:19 unused avahi-daemon[649]: Registering new address record for 10.66.110.85 on ens5.IPv4. >Oct 29 11:21:19 unused dhclient[2706]: bound to 10.66.110.85 -- renewal in 5945 seconds. >Oct 29 11:21:19 unused NetworkManager[796]: <info> Policy set 'ens5' (ens5) as default for IPv4 routing and DNS. >Oct 29 11:21:19 unused NetworkManager[796]: <info> Activation (ens5) successful, device activated. >Oct 29 11:21:19 unused dbus-daemon: dbus[676]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Oct 29 11:21:19 unused dbus[676]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Oct 29 11:21:19 unused systemd: Starting Network Manager Script Dispatcher Service... >Oct 29 11:21:19 unused dbus-daemon: dbus[676]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Oct 29 11:21:19 unused dbus[676]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Oct 29 11:21:19 unused systemd: Started Network Manager Script Dispatcher Service. >Oct 29 11:21:19 unused systemd: Unit iscsi.service cannot be reloaded because it is inactive. >Oct 29 11:21:20 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:21:20 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:20 unused dracut: dracut- >Oct 29 11:21:20 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:21:20 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:20 unused dracut: Executing: /usr/sbin/dracut --hostonly --hostonly-cmdline -o "plymouth dash resume" -f /boot/initramfs-3.10.0-196.el7.x86_64kdump.img 3.10.0-196.el7.x86_64 >Oct 29 11:21:20 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:21:21 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:21 unused systemd: Started Wait for Plymouth Boot Screen to Quit. >Oct 29 11:21:21 unused systemd: Starting Serial Getty on ttyS0... >Oct 29 11:21:21 unused systemd: Started Serial Getty on ttyS0. >Oct 29 11:21:21 unused systemd: Starting Login Prompts. >Oct 29 11:21:21 unused systemd: Reached target Login Prompts. >Oct 29 11:21:21 unused avahi-daemon[649]: Registering new address record for fe80::984e:4fff:fe50:5152 on ens5.*. >Oct 29 11:21:21 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4232f3ec-5ccd-4850-ba76-4a70ff4565b6 >Oct 29 11:21:21 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:21 unused systemd: Starting user-42.slice. >Oct 29 11:21:21 unused systemd: Created slice user-42.slice. >Oct 29 11:21:21 unused systemd: Starting Session c1 of user gdm. >Oct 29 11:21:21 unused systemd: Started Session c1 of user gdm. >Oct 29 11:21:21 unused systemd-logind: New session c1 of user gdm. >Oct 29 11:21:21 unused systemd-logind: Linked /tmp/.X11-unix/X0 to /run/user/42/X11-display. >Oct 29 11:21:21 unused dracut: dracut module 'plymouth' will not be installed, because it's in the list to be omitted! >Oct 29 11:21:21 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 29 11:21:21 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:22 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 29 11:21:22 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:22 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f60195bb-d64d-4eb0-a8f4-cf8a2b920ac8 >Oct 29 11:21:22 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:22 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5ab16217-4ece-422d-83ed-2d510b7f6e4a >Oct 29 11:21:22 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:22 unused dracut: dracut module 'resume' will not be installed, because it's in the list to be omitted! >Oct 29 11:21:22 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l adc127d5-3ba3-4600-a18a-c60d41d563f5 >Oct 29 11:21:22 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:22 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:21:22 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:22 unused NetworkManager[796]: <info> startup complete >Oct 29 11:21:22 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 06db745f-002f-4e84-a79a-b463031747bc >Oct 29 11:21:22 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:22 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 06db745f-002f-4e84-a79a-b463031747bc >Oct 29 11:21:22 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:23 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:21:23 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:23 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8a2839f5-9652-4d11-b7f0-45cf9ee50720 >Oct 29 11:21:23 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:23 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:21:23 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:23 unused dracut: *** Including module: bash *** >Oct 29 11:21:23 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:21:23 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:23 unused dracut: *** Including module: i18n *** >Oct 29 11:21:23 unused dbus-daemon: dbus[676]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Oct 29 11:21:23 unused dbus[676]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Oct 29 11:21:23 unused systemd: Starting Daemon for power management... >Oct 29 11:21:23 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l bb129500-3477-472a-b1a1-1b7d123c1da8 >Oct 29 11:21:23 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:23 unused dbus-daemon: dbus[676]: [system] Successfully activated service 'org.freedesktop.UPower' >Oct 29 11:21:23 unused dbus[676]: [system] Successfully activated service 'org.freedesktop.UPower' >Oct 29 11:21:23 unused systemd: Started Daemon for power management. >Oct 29 11:21:23 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d95da5c3-8c53-450d-a9b2-dfb19b652de8 >Oct 29 11:21:23 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:23 unused gnome-session: (gnome-settings-daemon:5161): power-plugin-WARNING **: failed to turn the panel on: Display is not DPMS capable >Oct 29 11:21:23 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l db8f5c38-2bac-4875-a619-b204531cc812 >Oct 29 11:21:23 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:24 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 149193bb-28ed-4b94-9604-5e107a9da7e2 >Oct 29 11:21:24 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:24 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2003831-eae3-45bc-9b03-1dd96a73f949 >Oct 29 11:21:24 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:24 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d95da5c3-8c53-450d-a9b2-dfb19b652de8 >Oct 29 11:21:24 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:24 unused dracut: *** Including module: network *** >Oct 29 11:21:24 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:21:24 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:24 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5ab16217-4ece-422d-83ed-2d510b7f6e4a >Oct 29 11:21:24 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:24 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 11:21:24 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:24 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 41005440-a55b-4233-93f3-db86ea99daba >Oct 29 11:21:24 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:24 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l af15d032-e5b6-477a-a4e0-d0db84c92e84 >Oct 29 11:21:24 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:25 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l af15d032-e5b6-477a-a4e0-d0db84c92e84 >Oct 29 11:21:25 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:25 unused dbus-daemon: dbus[676]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Oct 29 11:21:25 unused dbus[676]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Oct 29 11:21:25 unused systemd: Starting Manage, Install and Generate Color Profiles... >Oct 29 11:21:25 unused gnome-session: Entering running state >Oct 29 11:21:25 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 75ef4f58-c198-49a6-9668-ae14c8a7007b >Oct 29 11:21:25 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:25 unused colord: Using config file /etc/colord.conf >Oct 29 11:21:25 unused colord: Using mapping database file /var/lib/colord/mapping.db >Oct 29 11:21:25 unused colord: Using device database file /var/lib/colord/storage.db >Oct 29 11:21:25 unused colord: loaded plugin libcd_plugin_camera.so >Oct 29 11:21:25 unused colord: loaded plugin libcd_plugin_scanner.so >Oct 29 11:21:25 unused colord: Daemon ready for requests >Oct 29 11:21:25 unused dbus[676]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Oct 29 11:21:25 unused dbus-daemon: dbus[676]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Oct 29 11:21:25 unused systemd: Started Manage, Install and Generate Color Profiles. >Oct 29 11:21:25 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b91b4263-e2c9-413f-9c5f-7869cacdb578 >Oct 29 11:21:25 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:25 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 97aea7ca-00fe-4e40-af8e-e0ec40282528 >Oct 29 11:21:25 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:25 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 94cf47a7-5a5c-405c-ab69-1601b787f238 >Oct 29 11:21:25 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:25 unused colord: Profile added: icc-021ec903471f953c28c57ccde43f9134 >Oct 29 11:21:25 unused colord: Profile added: icc-7e1e684edc9a0671f5305d656d8cb8c9 >Oct 29 11:21:25 unused colord: Profile added: icc-0f6451e33e7342d0f90bb960912bb812 >Oct 29 11:21:25 unused colord: Profile added: icc-8f465237bb45ee1d16fdbd6b4038c719 >Oct 29 11:21:25 unused colord: Profile added: icc-8daff74b7142df23f76b3d5ef126bbf9 >Oct 29 11:21:25 unused colord: Profile added: icc-f16a3fe7a0d2f471188cf45202ae43ac >Oct 29 11:21:25 unused rtkit-daemon[675]: Successfully made thread 5806 of process 5806 (/usr/bin/pulseaudio) owned by '42' high priority at nice level -11. >Oct 29 11:21:25 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 05d5fa63-cbd7-453f-b673-c378b16914f0 >Oct 29 11:21:25 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:25 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:21:25 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:25 unused dbus-daemon: dbus[676]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 29 11:21:25 unused dbus[676]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 29 11:21:25 unused systemd: Starting Locale Service... >Oct 29 11:21:25 unused dracut: *** Including module: ifcfg *** >Oct 29 11:21:25 unused gnome-session: (gnome-settings-daemon:5161): color-plugin-WARNING **: failed to get edid: unable to get EDID for output >Oct 29 11:21:25 unused dracut: *** Including module: drm *** >Oct 29 11:21:25 unused dbus-daemon: dbus[676]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 29 11:21:25 unused dbus[676]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 29 11:21:25 unused systemd: Started Locale Service. >Oct 29 11:21:25 unused colord: Device added: xrandr-Virtual-0 >Oct 29 11:21:26 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:21:26 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:26 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:21:26 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:26 unused gnome-session: (gnome-settings-daemon:5161): color-plugin-WARNING **: unable to get EDID for xrandr-Virtual-0: unable to get EDID for output >Oct 29 11:21:26 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8a64fd6d-c54b-4627-b7b5-44f0b14979dd >Oct 29 11:21:26 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:26 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 396a1310-4088-41c8-90a8-d43b4f19499c >Oct 29 11:21:26 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:26 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 396a1310-4088-41c8-90a8-d43b4f19499c >Oct 29 11:21:26 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:26 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d772382b-e332-4fba-8873-f558166b6023 >Oct 29 11:21:26 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:26 unused dracut: *** Including module: dm *** >Oct 29 11:21:26 unused dracut: Skipping udev rule: 64-device-mapper.rules >Oct 29 11:21:26 unused dracut: Skipping udev rule: 60-persistent-storage-dm.rules >Oct 29 11:21:26 unused dracut: Skipping udev rule: 55-dm.rules >Oct 29 11:21:26 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2094586-a8f8-4bc1-af02-534887cfd2f4 >Oct 29 11:21:26 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::primary after class was initialised >Oct 29 11:21:26 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::index after class was initialised >Oct 29 11:21:26 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:26 unused dracut: *** Including module: kernel-modules *** >Oct 29 11:21:27 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2094586-a8f8-4bc1-af02-534887cfd2f4 >Oct 29 11:21:27 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:27 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0b13c0cf-312e-4166-b485-88d815f566fb >Oct 29 11:21:27 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:27 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b427ecb2-8229-4dc3-b9ee-ffea01dcd104 >Oct 29 11:21:27 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:27 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:21:27 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:27 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0e7f911c-862c-4a1b-bdef-924387d5c7e9 >Oct 29 11:21:27 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:27 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:21:27 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:27 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 04b4c9d6-e337-439c-bb70-255a7898dcb3 >Oct 29 11:21:27 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:27 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:21:27 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:28 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5f10f707-7a84-461f-9e81-f835d4ea195d >Oct 29 11:21:28 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:28 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:21:28 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:28 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0e378e0b-9b3c-4d2f-84b9-ce2845665953 >Oct 29 11:21:28 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:28 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b94cfdf3-87b2-4b6e-abf5-837aee9d5e47 >Oct 29 11:21:28 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:28 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:21:28 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:28 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 829d18ca-3d16-4e5a-8496-a95d9ab10d6c >Oct 29 11:21:28 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:28 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 63dc4b7a-9372-4551-bd5d-9f0980157bc4 >Oct 29 11:21:28 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:28 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l be15d920-943b-4dae-ab10-813bdf4c9056 >Oct 29 11:21:28 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:29 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:21:29 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:29 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f31e2e16-ef9a-43df-bba1-a28015fc34cb >Oct 29 11:21:29 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:29 unused gnome-session: JS LOG: GNOME Shell started at Wed Oct 29 2014 11:21:29 GMT+0800 (CST) >Oct 29 11:21:29 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:21:29 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:29 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f31e2e16-ef9a-43df-bba1-a28015fc34cb >Oct 29 11:21:29 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:29 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:21:29 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:29 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:21:29 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:29 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:21:29 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:29 unused dbus-daemon: dbus[676]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Oct 29 11:21:29 unused dbus[676]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Oct 29 11:21:29 unused systemd: Starting Fingerprint Authentication Daemon... >Oct 29 11:21:30 unused dbus-daemon: dbus[676]: [system] Successfully activated service 'net.reactivated.Fprint' >Oct 29 11:21:30 unused dbus[676]: [system] Successfully activated service 'net.reactivated.Fprint' >Oct 29 11:21:30 unused systemd: Started Fingerprint Authentication Daemon. >Oct 29 11:21:30 unused fprintd: Launching FprintObject >Oct 29 11:21:30 unused fprintd: ** Message: D-Bus service launched with name: net.reactivated.Fprint >Oct 29 11:21:30 unused fprintd: ** Message: entering main loop >Oct 29 11:21:30 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:21:30 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:30 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:21:30 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:30 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 88a7869a-040a-4f0e-80c5-b6a4e8755bb3 >Oct 29 11:21:30 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:30 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:21:30 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:30 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:21:30 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:30 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l dc7e7c9b-7e67-4b25-821f-418ef1def3e4 >Oct 29 11:21:30 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:30 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:21:30 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:21:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:21:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8dd8c574-fc63-4b6f-9f6c-45c2df7870d4 >Oct 29 11:21:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 11:21:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 3ed0fa73-53ef-48c0-bb88-c1fd8f856461 >Oct 29 11:21:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 11:21:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 87bc0983-0c80-42d2-a090-26c7ed966389 >Oct 29 11:21:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:21:32 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:21:32 unused dbus-daemon: Exception in thread Thread-1 (most likely raised during interpreter shutdown):string index out of range >Oct 29 11:21:32 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 29 11:21:32 unused dracut: *** Including module: lvm *** >Oct 29 11:21:32 unused dracut: Skipping udev rule: 64-device-mapper.rules >Oct 29 11:21:32 unused dracut: Skipping udev rule: 56-lvm.rules >Oct 29 11:21:32 unused dracut: Skipping udev rule: 60-persistent-storage-lvm.rules >Oct 29 11:21:32 unused dracut: *** Including module: fcoe *** >Oct 29 11:21:32 unused dracut: *** Including module: fcoe-uefi *** >Oct 29 11:21:32 unused dracut: *** Including module: rootfs-block *** >Oct 29 11:21:32 unused dracut: *** Including module: terminfo *** >Oct 29 11:21:32 unused dracut: *** Including module: udev-rules *** >Oct 29 11:21:33 unused dracut: Skipping udev rule: 91-permissions.rules >Oct 29 11:21:33 unused dracut: *** Including module: biosdevname *** >Oct 29 11:21:33 unused dracut: *** Including module: systemd *** >Oct 29 11:21:33 unused dracut: *** Including module: usrmount *** >Oct 29 11:21:33 unused dracut: *** Including module: base *** >Oct 29 11:21:34 unused dracut: *** Including module: fs-lib *** >Oct 29 11:21:34 unused dracut: *** Including module: kdumpbase *** >Oct 29 11:21:34 unused dracut: *** Including module: shutdown *** >Oct 29 11:21:35 unused dracut: *** Including module: uefi-lib *** >Oct 29 11:21:35 unused dracut: *** Including modules done *** >Oct 29 11:21:35 unused dracut: *** Installing kernel module dependencies and firmware *** >Oct 29 11:21:35 unused dracut: *** Installing kernel module dependencies and firmware done *** >Oct 29 11:21:35 unused dracut: *** Resolving executable dependencies *** >Oct 29 11:21:36 unused dracut: *** Resolving executable dependencies done*** >Oct 29 11:21:36 unused systemd: Starting user-0.slice. >Oct 29 11:21:36 unused systemd: Created slice user-0.slice. >Oct 29 11:21:36 unused systemd: Starting Session 1 of user root. >Oct 29 11:21:36 unused systemd: Started Session 1 of user root. >Oct 29 11:21:36 unused systemd-logind: New session 1 of user root. >Oct 29 11:21:36 unused dracut: *** Pre-linking files *** >Oct 29 11:21:37 unused dracut: *** Pre-linking files done *** >Oct 29 11:21:37 unused dracut: *** Hardlinking files *** >Oct 29 11:21:37 unused dracut: *** Hardlinking files done *** >Oct 29 11:21:37 unused dracut: *** Stripping files *** >Oct 29 11:21:37 unused dracut: *** Stripping files done *** >Oct 29 11:21:37 unused dracut: *** Generating early-microcode cpio image *** >Oct 29 11:21:37 unused dracut: *** Constructing GenuineIntel.bin **** >Oct 29 11:21:37 unused dracut: *** Store current command line parameters *** >Oct 29 11:21:37 unused dracut: *** Creating image file *** >Oct 29 11:21:50 unused dracut: *** Creating image file done *** >Oct 29 11:21:50 unused kdumpctl: cat: write error: Broken pipe >Oct 29 11:21:56 unused kdumpctl: kexec: loaded kdump kernel >Oct 29 11:21:56 unused kdumpctl: Starting kdump: [OK] >Oct 29 11:21:56 unused systemd: Started Crash recovery kernel arming. >Oct 29 11:21:56 unused systemd: Starting Multi-User System. >Oct 29 11:21:56 unused systemd: Reached target Multi-User System. >Oct 29 11:21:56 unused systemd: Starting Graphical Interface. >Oct 29 11:21:56 unused systemd: Reached target Graphical Interface. >Oct 29 11:21:56 unused systemd: Starting Update UTMP about System Runlevel Changes... >Oct 29 11:21:56 unused systemd: Started Stop Read-Ahead Data Collection 10s After Completed Startup. >Oct 29 11:21:56 unused systemd: Started Update UTMP about System Runlevel Changes. >Oct 29 11:21:56 unused systemd: Startup finished in 780ms (kernel) + 1.918s (initrd) + 1min 19.387s (userspace) = 1min 22.087s. >Oct 29 11:22:00 unused fprintd: ** Message: No devices in use, exit >Oct 29 11:22:19 unused systemd: Stopping Session 1 of user root. >Oct 29 11:22:19 unused systemd: Stopping Session c1 of user gdm. >Oct 29 11:22:19 unused systemd: Stopping LVM2 PV scan on device 8:2... >Oct 29 11:22:19 unused systemd: Stopping system-getty.slice. >Oct 29 11:22:19 unused systemd: Removed slice system-getty.slice. >Oct 29 11:22:19 unused systemd: Stopping Dump dmesg to /var/log/dmesg... >Oct 29 11:22:19 unused systemd: Stopped Dump dmesg to /var/log/dmesg. >Oct 29 11:22:19 unused systemd: Stopping Graphical Interface. >Oct 29 11:22:19 unused systemd: Stopped target Graphical Interface. >Oct 29 11:22:19 unused systemd: Stopping Multi-User System. >Oct 29 11:22:19 unused systemd: Stopped target Multi-User System. >Oct 29 11:22:19 unused systemd: Stopping Command Scheduler... >Oct 29 11:22:19 unused gdm: Tried to look up non-existent conversation gdm-launch-environment >Oct 29 11:22:19 unused rsyslogd: [origin software="rsyslogd" swVersion="7.4.7" x-pid="654" x-info="http://www.rsyslog.com"] exiting on signal 15. >Oct 29 11:24:16 unused rsyslogd: [origin software="rsyslogd" swVersion="7.4.7" x-pid="655" x-info="http://www.rsyslog.com"] start >Oct 29 11:23:51 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:23:51 unused kernel: Initializing cgroup subsys cpuset >Oct 29 11:23:51 unused kernel: Initializing cgroup subsys cpu >Oct 29 11:23:51 unused kernel: Initializing cgroup subsys cpuacct >Oct 29 11:23:51 unused kernel: Linux version 3.10.0-196.el7.x86_64 (mockbuild@x86-018.build.eng.bos.redhat.com) (gcc version 4.8.3 20140911 (Red Hat 4.8.3-7) (GCC) ) #1 SMP Tue Oct 28 11:16:22 EDT 2014 >Oct 29 11:23:51 unused kernel: Command line: BOOT_IMAGE=/vmlinuz-3.10.0-196.el7.x86_64 root=/dev/mapper/rhel_unused-root ro crashkernel=auto rd.lvm.lv=rhel_unused/root rd.lvm.lv=rhel_unused/swap console=tty0 console=ttyS0,115200 LANG=en_US.UTF-8 systemd.debug >Oct 29 11:23:51 unused kernel: e820: BIOS-provided physical RAM map: >Oct 29 11:23:51 unused kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable >Oct 29 11:23:51 unused kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved >Oct 29 11:23:51 unused kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved >Oct 29 11:23:51 unused kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdffff] usable >Oct 29 11:23:51 unused kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved >Oct 29 11:23:51 unused kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved >Oct 29 11:23:51 unused kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved >Oct 29 11:23:51 unused kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable >Oct 29 11:23:51 unused kernel: NX (Execute Disable) protection: active >Oct 29 11:23:51 unused kernel: SMBIOS 2.8 present. >Oct 29 11:23:51 unused kernel: Hypervisor detected: KVM >Oct 29 11:23:51 unused kernel: No AGP bridge found >Oct 29 11:23:51 unused kernel: e820: last_pfn = 0x140000 max_arch_pfn = 0x400000000 >Oct 29 11:23:51 unused kernel: x86 PAT enabled: cpu 0, old 0x7040600070406, new 0x7010600070106 >Oct 29 11:23:51 unused kernel: e820: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 >Oct 29 11:23:51 unused kernel: found SMP MP-table at [mem 0x000f2030-0x000f203f] mapped at [ffff8800000f2030] >Oct 29 11:23:51 unused kernel: init_memory_mapping: [mem 0x00000000-0x000fffff] >Oct 29 11:23:51 unused kernel: init_memory_mapping: [mem 0x13fe00000-0x13fffffff] >Oct 29 11:23:51 unused kernel: init_memory_mapping: [mem 0x13c000000-0x13fdfffff] >Oct 29 11:23:51 unused kernel: init_memory_mapping: [mem 0x100000000-0x13bffffff] >Oct 29 11:23:51 unused kernel: init_memory_mapping: [mem 0x00100000-0xbffdffff] >Oct 29 11:23:51 unused kernel: RAMDISK: [mem 0x35d2e000-0x36e8efff] >Oct 29 11:23:51 unused kernel: ACPI: RSDP 00000000000f1d90 00014 (v00 BOCHS ) >Oct 29 11:23:51 unused kernel: ACPI: RSDT 00000000bffe1931 00030 (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001) >Oct 29 11:23:51 unused kernel: ACPI: FACP 00000000bffe0b37 00074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001) >Oct 29 11:23:51 unused kernel: ACPI: DSDT 00000000bffe0040 00AF7 (v01 BOCHS BXPCDSDT 00000001 BXPC 00000001) >Oct 29 11:23:51 unused kernel: ACPI: FACS 00000000bffe0000 00040 >Oct 29 11:23:51 unused kernel: ACPI: SSDT 00000000bffe0bab 00CF6 (v01 BOCHS BXPCSSDT 00000001 BXPC 00000001) >Oct 29 11:23:51 unused kernel: ACPI: APIC 00000000bffe18a1 00090 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001) >Oct 29 11:23:51 unused kernel: No NUMA configuration found >Oct 29 11:23:51 unused kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] >Oct 29 11:23:51 unused kernel: Initmem setup node 0 [mem 0x00000000-0x13fffffff] >Oct 29 11:23:51 unused kernel: NODE_DATA [mem 0x13ffd6000-0x13fffcfff] >Oct 29 11:23:51 unused kernel: Reserving 161MB of memory at 688MB for crashkernel (System RAM: 4095MB) >Oct 29 11:23:51 unused kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 >Oct 29 11:23:51 unused kernel: kvm-clock: cpu 0, msr 1:3ff86001, primary cpu clock >Oct 29 11:23:51 unused kernel: Zone ranges: >Oct 29 11:23:51 unused kernel: DMA [mem 0x00001000-0x00ffffff] >Oct 29 11:23:51 unused kernel: DMA32 [mem 0x01000000-0xffffffff] >Oct 29 11:23:51 unused kernel: Normal [mem 0x100000000-0x13fffffff] >Oct 29 11:23:51 unused kernel: Movable zone start for each node >Oct 29 11:23:51 unused kernel: Early memory node ranges >Oct 29 11:23:51 unused kernel: node 0: [mem 0x00001000-0x0009efff] >Oct 29 11:23:51 unused kernel: node 0: [mem 0x00100000-0xbffdffff] >Oct 29 11:23:51 unused kernel: node 0: [mem 0x100000000-0x13fffffff] >Oct 29 11:23:51 unused kernel: ACPI: PM-Timer IO Port: 0x608 >Oct 29 11:23:51 unused kernel: ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled) >Oct 29 11:23:51 unused kernel: ACPI: LAPIC (acpi_id[0x01] lapic_id[0x01] enabled) >Oct 29 11:23:51 unused kernel: ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled) >Oct 29 11:23:51 unused kernel: ACPI: LAPIC (acpi_id[0x03] lapic_id[0x03] enabled) >Oct 29 11:23:51 unused kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) >Oct 29 11:23:51 unused kernel: ACPI: IOAPIC (id[0x00] address[0xfec00000] gsi_base[0]) >Oct 29 11:23:51 unused kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 >Oct 29 11:23:51 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) >Oct 29 11:23:51 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) >Oct 29 11:23:51 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) >Oct 29 11:23:51 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) >Oct 29 11:23:51 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) >Oct 29 11:23:51 unused kernel: Using ACPI (MADT) for SMP configuration information >Oct 29 11:23:51 unused kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs >Oct 29 11:23:51 unused kernel: PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff] >Oct 29 11:23:51 unused kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000effff] >Oct 29 11:23:51 unused kernel: PM: Registered nosave memory: [mem 0x000f0000-0x000fffff] >Oct 29 11:23:51 unused kernel: PM: Registered nosave memory: [mem 0xbffe0000-0xbfffffff] >Oct 29 11:23:51 unused kernel: PM: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] >Oct 29 11:23:51 unused kernel: PM: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] >Oct 29 11:23:51 unused kernel: PM: Registered nosave memory: [mem 0xff000000-0xfffbffff] >Oct 29 11:23:51 unused kernel: PM: Registered nosave memory: [mem 0xfffc0000-0xffffffff] >Oct 29 11:23:51 unused kernel: e820: [mem 0xc0000000-0xfeffbfff] available for PCI devices >Oct 29 11:23:51 unused kernel: Booting paravirtualized kernel on KVM >Oct 29 11:23:51 unused kernel: setup_percpu: NR_CPUS:5120 nr_cpumask_bits:4 nr_cpu_ids:4 nr_node_ids:1 >Oct 29 11:23:51 unused kernel: PERCPU: Embedded 29 pages/cpu @ffff88013fc00000 s86720 r8192 d23872 u524288 >Oct 29 11:23:51 unused kernel: KVM setup async PF for cpu 0 >Oct 29 11:23:51 unused kernel: kvm-stealtime: cpu 0, msr 13fc0e000 >Oct 29 11:23:51 unused kernel: Built 1 zonelists in Node order, mobility grouping on. Total pages: 1032041 >Oct 29 11:23:51 unused kernel: Policy zone: Normal >Oct 29 11:23:51 unused kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-3.10.0-196.el7.x86_64 root=/dev/mapper/rhel_unused-root ro crashkernel=auto rd.lvm.lv=rhel_unused/root rd.lvm.lv=rhel_unused/swap console=tty0 console=ttyS0,115200 LANG=en_US.UTF-8 systemd.debug >Oct 29 11:23:51 unused kernel: PID hash table entries: 4096 (order: 3, 32768 bytes) >Oct 29 11:23:51 unused kernel: xsave: enabled xstate_bv 0x7, cntxt size 0x340 >Oct 29 11:23:51 unused kernel: Checking aperture... >Oct 29 11:23:51 unused kernel: No AGP bridge found >Oct 29 11:23:51 unused kernel: Memory: 3863488k/5242880k available (6240k kernel code, 1049096k absent, 330296k reserved, 4181k data, 1604k init) >Oct 29 11:23:51 unused kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 >Oct 29 11:23:51 unused kernel: Hierarchical RCU implementation. >Oct 29 11:23:51 unused kernel: RCU restricting CPUs from NR_CPUS=5120 to nr_cpu_ids=4. >Oct 29 11:23:51 unused kernel: Experimental no-CBs for all CPUs >Oct 29 11:23:51 unused kernel: Experimental no-CBs CPUs: 0-3. >Oct 29 11:23:51 unused kernel: NR_IRQS:327936 nr_irqs:712 16 >Oct 29 11:23:51 unused kernel: Console: colour VGA+ 80x25 >Oct 29 11:23:51 unused kernel: console [tty0] enabled >Oct 29 11:23:51 unused kernel: console [ttyS0] enabled >Oct 29 11:23:51 unused kernel: allocated 16777216 bytes of page_cgroup >Oct 29 11:23:51 unused kernel: please try 'cgroup_disable=memory' option if you don't want memory cgroups >Oct 29 11:23:51 unused kernel: tsc: Detected 1999.999 MHz processor >Oct 29 11:23:51 unused kernel: Calibrating delay loop (skipped) preset value.. 3999.99 BogoMIPS (lpj=1999999) >Oct 29 11:23:51 unused kernel: pid_max: default: 32768 minimum: 301 >Oct 29 11:23:51 unused kernel: Security Framework initialized >Oct 29 11:23:51 unused kernel: SELinux: Initializing. >Oct 29 11:23:51 unused kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes) >Oct 29 11:23:51 unused kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes) >Oct 29 11:23:51 unused kernel: Mount-cache hash table entries: 4096 >Oct 29 11:23:51 unused kernel: Initializing cgroup subsys memory >Oct 29 11:23:51 unused kernel: Initializing cgroup subsys devices >Oct 29 11:23:51 unused kernel: Initializing cgroup subsys freezer >Oct 29 11:23:51 unused kernel: Initializing cgroup subsys net_cls >Oct 29 11:23:51 unused kernel: Initializing cgroup subsys blkio >Oct 29 11:23:51 unused kernel: Initializing cgroup subsys perf_event >Oct 29 11:23:51 unused kernel: Initializing cgroup subsys hugetlb >Oct 29 11:23:51 unused kernel: CPU: Physical Processor ID: 0 >Oct 29 11:23:51 unused kernel: CPU: Processor Core ID: 0 >Oct 29 11:23:51 unused kernel: mce: CPU supports 10 MCE banks >Oct 29 11:23:51 unused kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 >Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0 >tlb_flushall_shift: 6 >Oct 29 11:23:51 unused kernel: Freeing SMP alternatives: 24k freed >Oct 29 11:23:51 unused kernel: ACPI: Core revision 20130517 >Oct 29 11:23:51 unused kernel: ACPI: All ACPI Tables successfully acquired >Oct 29 11:23:51 unused kernel: ftrace: allocating 23897 entries in 94 pages >Oct 29 11:23:51 unused kernel: Enabling x2apic >Oct 29 11:23:51 unused kernel: Enabled x2apic >Oct 29 11:23:51 unused kernel: Switched APIC routing to physical x2apic. >Oct 29 11:23:51 unused kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 >Oct 29 11:23:51 unused kernel: smpboot: CPU0: Intel Xeon E312xx (Sandy Bridge) (fam: 06, model: 2a, stepping: 01) >Oct 29 11:23:51 unused kernel: Performance Events: unsupported p6 CPU model 42 no PMU driver, software events only. >Oct 29 11:23:51 unused kernel: KVM setup paravirtual spinlock >Oct 29 11:23:51 unused kernel: NMI watchdog: disabled (cpu0): hardware events not enabled >Oct 29 11:23:51 unused kernel: kvm-clock: cpu 1, msr 1:3ff86041, secondary cpu clock >Oct 29 11:23:51 unused kernel: KVM setup async PF for cpu 1 >Oct 29 11:23:51 unused kernel: kvm-stealtime: cpu 1, msr 13fc8e000 >Oct 29 11:23:51 unused kernel: kvm-clock: cpu 2, msr 1:3ff86081, secondary cpu clock >Oct 29 11:23:51 unused kernel: KVM setup async PF for cpu 2 >Oct 29 11:23:51 unused kernel: smpboot: Booting Node 0, Processors #1 #2 #3 OK >Oct 29 11:23:51 unused kernel: kvm-stealtime: cpu 2, msr 13fd0e000 >Oct 29 11:23:51 unused kernel: kvm-clock: cpu 3, msr 1:3ff860c1, secondary cpu clock >Oct 29 11:23:51 unused kernel: Brought up 4 CPUs >Oct 29 11:23:51 unused kernel: KVM setup async PF for cpu 3 >Oct 29 11:23:51 unused kernel: kvm-stealtime: cpu 3, msr 13fd8e000 >Oct 29 11:23:51 unused kernel: smpboot: Total of 4 processors activated (15999.99 BogoMIPS) >Oct 29 11:23:51 unused kernel: devtmpfs: initialized >Oct 29 11:23:51 unused kernel: EVM: security.selinux >Oct 29 11:23:51 unused kernel: EVM: security.ima >Oct 29 11:23:51 unused kernel: EVM: security.capability >Oct 29 11:23:51 unused kernel: atomic64 test passed for x86-64 platform with CX8 and with SSE >Oct 29 11:23:51 unused kernel: NET: Registered protocol family 16 >Oct 29 11:23:51 unused kernel: ACPI: bus type PCI registered >Oct 29 11:23:51 unused kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 >Oct 29 11:23:51 unused kernel: PCI: Using configuration type 1 for base access >Oct 29 11:23:51 unused kernel: ACPI: Added _OSI(Module Device) >Oct 29 11:23:51 unused kernel: ACPI: Added _OSI(Processor Device) >Oct 29 11:23:51 unused kernel: ACPI: Added _OSI(3.0 _SCP Extensions) >Oct 29 11:23:51 unused kernel: ACPI: Added _OSI(Processor Aggregator Device) >Oct 29 11:23:51 unused kernel: ACPI: Interpreter enabled >Oct 29 11:23:51 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S1_] (20130517/hwxface-571) >Oct 29 11:23:51 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S2_] (20130517/hwxface-571) >Oct 29 11:23:51 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S3_] (20130517/hwxface-571) >Oct 29 11:23:51 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S4_] (20130517/hwxface-571) >Oct 29 11:23:51 unused kernel: ACPI: (supports S0 S5) >Oct 29 11:23:51 unused kernel: ACPI: Using IOAPIC for interrupt routing >Oct 29 11:23:51 unused kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug >Oct 29 11:23:51 unused kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) >Oct 29 11:23:51 unused kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI] >Oct 29 11:23:51 unused kernel: acpi PNP0A03:00: _OSC failed (AE_NOT_FOUND); disabling ASPM >Oct 29 11:23:51 unused kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. >Oct 29 11:23:51 unused kernel: acpiphp: Slot [4] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [5] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [6] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [7] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [8] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [9] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [10] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [11] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [12] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [13] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [14] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [15] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [16] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [17] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [18] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [19] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [20] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [21] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [22] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [23] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [24] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [25] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [26] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [27] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [28] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [29] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [30] registered >Oct 29 11:23:51 unused kernel: acpiphp: Slot [31] registered >Oct 29 11:23:51 unused kernel: PCI host bridge to bus 0000:00 >Oct 29 11:23:51 unused kernel: pci_bus 0000:00: root bus resource [bus 00-ff] >Oct 29 11:23:51 unused kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7] >Oct 29 11:23:51 unused kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xadff] >Oct 29 11:23:51 unused kernel: pci_bus 0000:00: root bus resource [io 0xae0f-0xaeff] >Oct 29 11:23:51 unused kernel: pci_bus 0000:00: root bus resource [io 0xaf20-0xafdf] >Oct 29 11:23:51 unused kernel: pci_bus 0000:00: root bus resource [io 0xafe4-0xffff] >Oct 29 11:23:51 unused kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff] >Oct 29 11:23:51 unused kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff] >Oct 29 11:23:51 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] >Oct 29 11:23:51 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] >Oct 29 11:23:51 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] >Oct 29 11:23:51 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] >Oct 29 11:23:51 unused kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI >Oct 29 11:23:51 unused kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB >Oct 29 11:23:51 unused kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) >Oct 29 11:23:51 unused kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) >Oct 29 11:23:51 unused kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) >Oct 29 11:23:51 unused kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) >Oct 29 11:23:51 unused kernel: ACPI: PCI Interrupt Link [LNKS] (IRQs *9) >Oct 29 11:23:51 unused kernel: ACPI: Enabled 16 GPEs in block 00 to 0F >Oct 29 11:23:51 unused kernel: vgaarb: device added: PCI:0000:00:02.0,decodes=io+mem,owns=io+mem,locks=none >Oct 29 11:23:51 unused kernel: vgaarb: loaded >Oct 29 11:23:51 unused kernel: vgaarb: bridge control possible 0000:00:02.0 >Oct 29 11:23:51 unused kernel: SCSI subsystem initialized >Oct 29 11:23:51 unused kernel: ACPI: bus type USB registered >Oct 29 11:23:51 unused kernel: usbcore: registered new interface driver usbfs >Oct 29 11:23:51 unused kernel: usbcore: registered new interface driver hub >Oct 29 11:23:51 unused kernel: usbcore: registered new device driver usb >Oct 29 11:23:51 unused kernel: PCI: Using ACPI for IRQ routing >Oct 29 11:23:51 unused kernel: NetLabel: Initializing >Oct 29 11:23:51 unused kernel: NetLabel: domain hash size = 128 >Oct 29 11:23:51 unused kernel: NetLabel: protocols = UNLABELED CIPSOv4 >Oct 29 11:23:51 unused kernel: NetLabel: unlabeled traffic allowed by default >Oct 29 11:23:51 unused kernel: Switching to clocksource kvm-clock >Oct 29 11:23:51 unused kernel: pnp: PnP ACPI init >Oct 29 11:23:51 unused kernel: ACPI: bus type PNP registered >Oct 29 11:23:51 unused kernel: pnp: PnP ACPI: found 5 devices >Oct 29 11:23:51 unused kernel: ACPI: bus type PNP unregistered >Oct 29 11:23:51 unused kernel: NET: Registered protocol family 2 >Oct 29 11:23:51 unused kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes) >Oct 29 11:23:51 unused kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes) >Oct 29 11:23:51 unused kernel: TCP: Hash tables configured (established 32768 bind 32768) >Oct 29 11:23:51 unused kernel: TCP: reno registered >Oct 29 11:23:51 unused kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes) >Oct 29 11:23:51 unused kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes) >Oct 29 11:23:51 unused kernel: NET: Registered protocol family 1 >Oct 29 11:23:51 unused kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers >Oct 29 11:23:51 unused kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release >Oct 29 11:23:51 unused kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds >Oct 29 11:23:51 unused kernel: ACPI: PCI Interrupt Link [LNKC] enabled at IRQ 11 >Oct 29 11:23:51 unused kernel: Unpacking initramfs... >Oct 29 11:23:51 unused kernel: Freeing initrd memory: 17796k freed >Oct 29 11:23:51 unused kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) >Oct 29 11:23:51 unused kernel: software IO TLB [mem 0xbbfe0000-0xbffe0000] (64MB) mapped at [ffff8800bbfe0000-ffff8800bffdffff] >Oct 29 11:23:51 unused kernel: microcode: CPU0 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:23:51 unused kernel: microcode: CPU1 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:23:51 unused kernel: microcode: CPU2 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:23:51 unused kernel: microcode: CPU3 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:23:51 unused kernel: microcode: Microcode Update Driver: v2.00 <tigran@aivazian.fsnet.co.uk>, Peter Oruba >Oct 29 11:23:51 unused kernel: futex hash table entries: 1024 (order: 4, 65536 bytes) >Oct 29 11:23:51 unused kernel: Initialise system trusted keyring >Oct 29 11:23:51 unused kernel: audit: initializing netlink socket (disabled) >Oct 29 11:23:51 unused kernel: type=2000 audit(1414553031.251:1): initialized >Oct 29 11:23:51 unused kernel: HugeTLB registered 2 MB page size, pre-allocated 0 pages >Oct 29 11:23:51 unused kernel: zbud: loaded >Oct 29 11:23:51 unused kernel: VFS: Disk quotas dquot_6.5.2 >Oct 29 11:23:51 unused kernel: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) >Oct 29 11:23:51 unused kernel: msgmni has been set to 7580 >Oct 29 11:23:51 unused kernel: Key type big_key registered >Oct 29 11:23:51 unused kernel: alg: No test for stdrng (krng) >Oct 29 11:23:51 unused kernel: NET: Registered protocol family 38 >Oct 29 11:23:51 unused kernel: Key type asymmetric registered >Oct 29 11:23:51 unused kernel: Asymmetric key parser 'x509' registered >Oct 29 11:23:51 unused kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 252) >Oct 29 11:23:51 unused kernel: io scheduler noop registered >Oct 29 11:23:51 unused kernel: io scheduler deadline registered (default) >Oct 29 11:23:51 unused kernel: io scheduler cfq registered >Oct 29 11:23:51 unused kernel: pci_hotplug: PCI Hot Plug PCI Core version: 0.5 >Oct 29 11:23:51 unused kernel: pciehp: PCI Express Hot Plug Controller Driver version: 0.4 >Oct 29 11:23:51 unused kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 >Oct 29 11:23:51 unused kernel: ACPI: Power Button [PWRF] >Oct 29 11:23:51 unused kernel: GHES: HEST is not enabled! >Oct 29 11:23:51 unused kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled >Oct 29 11:23:51 unused kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A >Oct 29 11:23:51 unused kernel: Non-volatile memory driver v1.3 >Oct 29 11:23:51 unused kernel: Linux agpgart interface v0.103 >Oct 29 11:23:51 unused kernel: crash memory driver: version 1.1 >Oct 29 11:23:51 unused kernel: rdac: device handler registered >Oct 29 11:23:51 unused kernel: hp_sw: device handler registered >Oct 29 11:23:51 unused kernel: emc: device handler registered >Oct 29 11:23:51 unused kernel: alua: device handler registered >Oct 29 11:23:51 unused kernel: libphy: Fixed MDIO Bus: probed >Oct 29 11:23:51 unused kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver >Oct 29 11:23:51 unused kernel: ehci-pci: EHCI PCI platform driver >Oct 29 11:23:51 unused kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver >Oct 29 11:23:51 unused kernel: ohci-pci: OHCI PCI platform driver >Oct 29 11:23:51 unused kernel: uhci_hcd: USB Universal Host Controller Interface driver >Oct 29 11:23:51 unused kernel: uhci_hcd 0000:00:03.0: UHCI Host Controller >Oct 29 11:23:51 unused kernel: uhci_hcd 0000:00:03.0: new USB bus registered, assigned bus number 1 >Oct 29 11:23:51 unused kernel: uhci_hcd 0000:00:03.0: detected 2 ports >Oct 29 11:23:51 unused kernel: uhci_hcd 0000:00:03.0: irq 11, io base 0x0000c0a0 >Oct 29 11:23:51 unused kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001 >Oct 29 11:23:51 unused kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Oct 29 11:23:51 unused kernel: usb usb1: Product: UHCI Host Controller >Oct 29 11:23:51 unused kernel: usb usb1: Manufacturer: Linux 3.10.0-196.el7.x86_64 uhci_hcd >Oct 29 11:23:51 unused kernel: usb usb1: SerialNumber: 0000:00:03.0 >Oct 29 11:23:51 unused kernel: hub 1-0:1.0: USB hub found >Oct 29 11:23:51 unused kernel: hub 1-0:1.0: 2 ports detected >Oct 29 11:23:51 unused kernel: usbcore: registered new interface driver usbserial >Oct 29 11:23:51 unused kernel: usbcore: registered new interface driver usbserial_generic >Oct 29 11:23:51 unused kernel: usbserial: USB Serial support registered for generic >Oct 29 11:23:51 unused kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 >Oct 29 11:23:51 unused kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 >Oct 29 11:23:51 unused kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 >Oct 29 11:23:51 unused kernel: mousedev: PS/2 mouse device common for all mice >Oct 29 11:23:51 unused kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 >Oct 29 11:23:51 unused kernel: rtc_cmos 00:00: RTC can wake from S4 >Oct 29 11:23:51 unused kernel: rtc_cmos 00:00: rtc core: registered rtc_cmos as rtc0 >Oct 29 11:23:51 unused kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram >Oct 29 11:23:51 unused kernel: cpuidle: using governor menu >Oct 29 11:23:51 unused kernel: hidraw: raw HID events driver (C) Jiri Kosina >Oct 29 11:23:51 unused kernel: usbcore: registered new interface driver usbhid >Oct 29 11:23:51 unused kernel: usbhid: USB HID core driver >Oct 29 11:23:51 unused kernel: drop_monitor: Initializing network drop monitor service >Oct 29 11:23:51 unused kernel: TCP: cubic registered >Oct 29 11:23:51 unused kernel: Initializing XFRM netlink socket >Oct 29 11:23:51 unused kernel: NET: Registered protocol family 10 >Oct 29 11:23:51 unused kernel: NET: Registered protocol family 17 >Oct 29 11:23:51 unused kernel: Loading compiled-in X.509 certificates >Oct 29 11:23:51 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' >Oct 29 11:23:51 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' >Oct 29 11:23:51 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: 8c65d2217a39e9fa0bc841f8ba391e662cf68bcc' >Oct 29 11:23:51 unused kernel: registered taskstats version 1 >Oct 29 11:23:51 unused kernel: Key type trusted registered >Oct 29 11:23:51 unused kernel: Key type encrypted registered >Oct 29 11:23:51 unused kernel: IMA: No TPM chip found, activating TPM-bypass! >Oct 29 11:23:51 unused kernel: rtc_cmos 00:00: setting system clock to 2014-10-29 03:23:51 UTC (1414553031) >Oct 29 11:23:51 unused kernel: Freeing unused kernel memory: 1604k freed >Oct 29 11:23:51 unused systemd[1]: Unknown kernel switch systemd.debug. Ignoring. >Oct 29 11:23:51 unused systemd[1]: Supported kernel switches: >Oct 29 11:23:51 unused systemd[1]: systemd.unit=UNIT Default unit to start >Oct 29 11:23:51 unused systemd[1]: rd.systemd.unit=UNIT Default unit to start when run in initrd >Oct 29 11:23:51 unused systemd[1]: systemd.dump_core=0|1 Dump core on crash >Oct 29 11:23:51 unused systemd[1]: systemd.crash_shell=0|1 Run shell on crash >Oct 29 11:23:51 unused systemd[1]: systemd.crash_chvt=N Change to VT #N on crash >Oct 29 11:23:51 unused systemd[1]: systemd.confirm_spawn=0|1 Confirm every process spawn >Oct 29 11:23:51 unused systemd[1]: systemd.show_status=0|1 Show status updates on the console during bootup >Oct 29 11:23:51 unused systemd[1]: systemd.log_target=console|kmsg|journal|journal-or-kmsg|syslog|syslog-or-kmsg|null >Oct 29 11:23:51 unused systemd[1]: Log target >Oct 29 11:23:51 unused systemd[1]: systemd.log_level=LEVEL Log level >Oct 29 11:23:51 unused systemd[1]: systemd.log_color=0|1 Highlight important log messages >Oct 29 11:23:51 unused systemd[1]: systemd.log_location=0|1 Include code location in log messages >Oct 29 11:23:51 unused systemd[1]: systemd.default_standard_output=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 11:23:51 unused systemd[1]: Set default log output for services >Oct 29 11:23:51 unused systemd[1]: systemd.default_standard_error=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 11:23:51 unused systemd[1]: Set default log error output for services >Oct 29 11:23:51 unused systemd[1]: systemd.setenv=ASSIGNMENT Set an environment variable for all spawned processes >Oct 29 11:23:51 unused systemd[1]: systemd 208 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ) >Oct 29 11:23:51 unused systemd[1]: Detected virtualization 'kvm'. >Oct 29 11:23:51 unused systemd[1]: Running in initial RAM disk. >Oct 29 11:23:51 unused systemd[1]: Set hostname to <unused>. >Oct 29 11:23:51 unused systemd[1]: Expecting device dev-mapper-rhel_unused\x2droot.device... >Oct 29 11:23:51 unused systemd[1]: Starting -.slice. >Oct 29 11:23:51 unused systemd[1]: Created slice -.slice. >Oct 29 11:23:51 unused systemd[1]: Starting System Slice. >Oct 29 11:23:51 unused systemd[1]: Created slice System Slice. >Oct 29 11:23:51 unused systemd[1]: Starting Slices. >Oct 29 11:23:51 unused systemd[1]: Reached target Slices. >Oct 29 11:23:51 unused systemd[1]: Starting Timers. >Oct 29 11:23:51 unused systemd[1]: Reached target Timers. >Oct 29 11:23:51 unused systemd[1]: Starting Journal Socket. >Oct 29 11:23:51 unused systemd[1]: Listening on Journal Socket. >Oct 29 11:23:51 unused systemd[1]: Started dracut ask for additional cmdline parameters. >Oct 29 11:23:51 unused systemd[1]: Starting dracut cmdline hook... >Oct 29 11:23:51 unused systemd[1]: Started Load Kernel Modules. >Oct 29 11:23:51 unused systemd[1]: Starting Setup Virtual Console... >Oct 29 11:23:51 unused systemd[1]: Starting Journal Service... >Oct 29 11:23:51 unused systemd[1]: Started Journal Service. >Oct 29 11:23:51 unused journal: Journal started >Oct 29 11:23:51 unused systemd: Starting udev Kernel Socket. >Oct 29 11:23:51 unused systemd: Listening on udev Kernel Socket. >Oct 29 11:23:51 unused systemd: Starting udev Control Socket. >Oct 29 11:23:51 unused systemd: Listening on udev Control Socket. >Oct 29 11:23:51 unused systemd: Starting Sockets. >Oct 29 11:23:51 unused systemd: Reached target Sockets. >Oct 29 11:23:51 unused systemd: Starting Create list of required static device nodes for the current kernel... >Oct 29 11:23:51 unused systemd: Starting Apply Kernel Variables... >Oct 29 11:23:51 unused systemd: Starting Swap. >Oct 29 11:23:51 unused systemd: Reached target Swap. >Oct 29 11:23:51 unused systemd: Starting Local File Systems. >Oct 29 11:23:51 unused systemd: Reached target Local File Systems. >Oct 29 11:23:51 unused systemd: Started Apply Kernel Variables. >Oct 29 11:23:51 unused systemd: Started Create list of required static device nodes for the current kernel. >Oct 29 11:23:51 unused systemd: Starting Create static device nodes in /dev... >Oct 29 11:23:51 unused dracut-cmdline: dracut-7.1 (Maipo) dracut-033-224.el7 >Oct 29 11:23:51 unused dracut-cmdline: Using kernel command line parameters: >Oct 29 11:23:51 unused systemd: Started Create static device nodes in /dev. >Oct 29 11:23:51 unused systemd: Started Setup Virtual Console. >Oct 29 11:23:51 unused kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd >Oct 29 11:23:51 unused systemd: Started dracut cmdline hook. >Oct 29 11:23:51 unused systemd: Starting dracut pre-udev hook... >Oct 29 11:23:51 unused kernel: device-mapper: uevent: version 1.0.3 >Oct 29 11:23:51 unused kernel: device-mapper: ioctl: 4.27.0-ioctl (2013-10-30) initialised: dm-devel@redhat.com >Oct 29 11:23:51 unused systemd: Started dracut pre-udev hook. >Oct 29 11:23:51 unused systemd: Starting udev Kernel Device Manager... >Oct 29 11:23:51 unused systemd-udevd[260]: starting version 208 >Oct 29 11:23:51 unused systemd: Started udev Kernel Device Manager. >Oct 29 11:23:51 unused systemd: Started dracut pre-trigger hook. >Oct 29 11:23:51 unused systemd: Starting udev Coldplug all Devices... >Oct 29 11:23:51 unused systemd: Mounting Configuration File System... >Oct 29 11:23:51 unused systemd: Mounted Configuration File System. >Oct 29 11:23:51 unused systemd: Started udev Coldplug all Devices. >Oct 29 11:23:51 unused systemd: Starting dracut initqueue hook... >Oct 29 11:23:51 unused kernel: FDC 0 is a S82078B >Oct 29 11:23:51 unused kernel: e1000: Intel(R) PRO/1000 Network Driver - version 7.3.21-k8-NAPI >Oct 29 11:23:51 unused kernel: e1000: Copyright (c) 1999-2006 Intel Corporation. >Oct 29 11:23:51 unused systemd: Starting System Initialization. >Oct 29 11:23:51 unused kernel: [drm] Initialized drm 1.1.0 20060810 >Oct 29 11:23:51 unused systemd: Reached target System Initialization. >Oct 29 11:23:51 unused systemd: Starting Show Plymouth Boot Screen... >Oct 29 11:23:51 unused systemd: Started Show Plymouth Boot Screen. >Oct 29 11:23:51 unused systemd: Started Dispatch Password Requests to Console Directory Watch. >Oct 29 11:23:51 unused systemd: Starting Paths. >Oct 29 11:23:51 unused systemd: Reached target Paths. >Oct 29 11:23:51 unused systemd: Starting Forward Password Requests to Plymouth Directory Watch. >Oct 29 11:23:51 unused systemd: Started Forward Password Requests to Plymouth Directory Watch. >Oct 29 11:23:51 unused systemd: Starting Basic System. >Oct 29 11:23:51 unused systemd: Reached target Basic System. >Oct 29 11:23:51 unused kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001 >Oct 29 11:23:51 unused kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=5 >Oct 29 11:23:51 unused kernel: usb 1-1: Product: QEMU USB Tablet >Oct 29 11:23:51 unused kernel: usb 1-1: Manufacturer: QEMU >Oct 29 11:23:51 unused kernel: usb 1-1: SerialNumber: 42 >Oct 29 11:23:51 unused kernel: ACPI: PCI Interrupt Link [LNKD] enabled at IRQ 10 >Oct 29 11:23:51 unused kernel: scsi host0: Virtio SCSI HBA >Oct 29 11:23:51 unused kernel: scsi 0:0:0:0: Direct-Access QEMU QEMU HARDDISK 2.1. PQ: 0 ANSI: 5 >Oct 29 11:23:51 unused kernel: scsi 0:0:1:0: CD-ROM QEMU QEMU CD-ROM 2.1. PQ: 0 ANSI: 5 >Oct 29 11:23:51 unused kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:03.0/usb1/1-1/1-1:1.0/input/input2 >Oct 29 11:23:51 unused kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Pointer [QEMU QEMU USB Tablet] on usb-0000:00:03.0-1/input0 >Oct 29 11:23:51 unused kernel: sr 0:0:1:0: [sr0] scsi3-mmc drive: 16x/50x cd/rw xa/form2 cdda tray >Oct 29 11:23:51 unused kernel: ACPI: PCI Interrupt Link [LNKA] enabled at IRQ 10 >Oct 29 11:23:51 unused kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 >Oct 29 11:23:51 unused kernel: sd 0:0:0:0: [sda] 41943040 512-byte logical blocks: (21.4 GB/20.0 GiB) >Oct 29 11:23:51 unused kernel: sd 0:0:0:0: [sda] Write Protect is off >Oct 29 11:23:51 unused kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA >Oct 29 11:23:51 unused kernel: sda: sda1 sda2 >Oct 29 11:23:51 unused kernel: sd 0:0:0:0: [sda] Attached SCSI disk >Oct 29 11:23:52 unused kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 >Oct 29 11:23:52 unused kernel: e1000 0000:00:05.0 eth0: (PCI:33MHz:32-bit) 9a:4e:4f:50:51:52 >Oct 29 11:23:52 unused kernel: e1000 0000:00:05.0 eth0: Intel(R) PRO/1000 Network Connection >Oct 29 11:23:52 unused kernel: scsi host1: ata_piix >Oct 29 11:23:52 unused kernel: scsi host2: ata_piix >Oct 29 11:23:52 unused kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 >Oct 29 11:23:52 unused kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 >Oct 29 11:23:52 unused kernel: tsc: Refined TSC clocksource calibration: 2000.007 MHz >Oct 29 11:23:52 unused kernel: ACPI: PCI Interrupt Link [LNKB] enabled at IRQ 11 >Oct 29 11:23:52 unused kernel: [drm] Device Version 0.0 >Oct 29 11:23:52 unused kernel: [drm] Compression level 0 log level 0 >Oct 29 11:23:52 unused kernel: [drm] Currently using mode #0, list at 0x488 >Oct 29 11:23:52 unused kernel: [drm] 12286 io pages at offset 0x1000000 >Oct 29 11:23:52 unused kernel: [drm] 16777216 byte draw area at offset 0x0 >Oct 29 11:23:52 unused kernel: [drm] RAM header offset: 0x3ffe000 >Oct 29 11:23:52 unused kernel: [drm] rom modes offset 0x488 for 128 modes >Oct 29 11:23:52 unused kernel: [TTM] Zone kernel: Available graphics memory: 1941456 kiB >Oct 29 11:23:52 unused systemd-udevd[263]: renamed network interface eth0 to ens5 >Oct 29 11:23:52 unused kernel: [TTM] Initializing pool allocator >Oct 29 11:23:52 unused kernel: [TTM] Initializing DMA pool allocator >Oct 29 11:23:52 unused kernel: [drm] qxl: 16M of VRAM memory size >Oct 29 11:23:52 unused kernel: [drm] qxl: 63M of IO pages memory ready (VRAM domain) >Oct 29 11:23:52 unused kernel: [drm] qxl: 32M of Surface memory size >Oct 29 11:23:52 unused kernel: [drm] main mem slot 1 [f8000000,3ffe000] >Oct 29 11:23:52 unused kernel: [drm] surface mem slot 2 [fc000000,2000000] >Oct 29 11:23:52 unused kernel: [drm] fb mappable at 0xF8000000, size 3145728 >Oct 29 11:23:52 unused kernel: [drm] fb: depth 24, pitch 4096, width 1024, height 768 >Oct 29 11:23:52 unused kernel: fbcon: qxldrmfb (fb0) is primary device >Oct 29 11:23:52 unused kernel: Console: switching to colour frame buffer device 128x48 >Oct 29 11:23:52 unused kernel: qxl 0000:00:02.0: fb0: qxldrmfb frame buffer device >Oct 29 11:23:52 unused kernel: qxl 0000:00:02.0: registered panic notifier >Oct 29 11:23:52 unused kernel: [drm] Initialized qxl 0.1.0 20120117 for 0000:00:02.0 on minor 0 >Oct 29 11:23:52 unused dracut-initqueue: Scanning devices sda2 for LVM logical volumes rhel_unused/root rhel_unused/swap >Oct 29 11:23:52 unused dracut-initqueue: inactive '/dev/rhel_unused/swap' [2.00 GiB] inherit >Oct 29 11:23:52 unused dracut-initqueue: inactive '/dev/rhel_unused/root' [17.47 GiB] inherit >Oct 29 11:23:52 unused systemd: Found device /dev/mapper/rhel_unused-root. >Oct 29 11:23:52 unused systemd: Starting File System Check on /dev/mapper/rhel_unused-root... >Oct 29 11:23:52 unused systemd-fsck: /sbin/fsck.xfs: XFS file system. >Oct 29 11:23:52 unused systemd: Started File System Check on /dev/mapper/rhel_unused-root. >Oct 29 11:23:52 unused systemd: Started dracut initqueue hook. >Oct 29 11:23:52 unused systemd: Started dracut pre-mount hook. >Oct 29 11:23:52 unused systemd: Mounting /sysroot... >Oct 29 11:23:52 unused systemd: Starting Remote File Systems (Pre). >Oct 29 11:23:52 unused systemd: Reached target Remote File Systems (Pre). >Oct 29 11:23:52 unused systemd: Starting Remote File Systems. >Oct 29 11:23:52 unused systemd: Reached target Remote File Systems. >Oct 29 11:23:52 unused kernel: SGI XFS with ACLs, security attributes, large block/inode numbers, no debug enabled >Oct 29 11:23:52 unused kernel: XFS (dm-0): Mounting V4 Filesystem >Oct 29 11:23:52 unused kernel: XFS (dm-0): Ending clean mount >Oct 29 11:23:52 unused systemd: Mounted /sysroot. >Oct 29 11:23:52 unused systemd: Starting Initrd Root File System. >Oct 29 11:23:52 unused systemd: Reached target Initrd Root File System. >Oct 29 11:23:52 unused systemd: Starting Reload Configuration from the Real Root... >Oct 29 11:23:52 unused systemd: Reloading. >Oct 29 11:23:52 unused systemd: Started Reload Configuration from the Real Root. >Oct 29 11:23:52 unused systemd: Starting Initrd File Systems. >Oct 29 11:23:52 unused systemd: Reached target Initrd File Systems. >Oct 29 11:23:52 unused systemd: Started dracut mount hook. >Oct 29 11:23:52 unused systemd: Starting Initrd Default Target. >Oct 29 11:23:52 unused systemd: Reached target Initrd Default Target. >Oct 29 11:23:52 unused systemd: Starting dracut pre-pivot and cleanup hook... >Oct 29 11:23:53 unused systemd: Started dracut pre-pivot and cleanup hook. >Oct 29 11:23:53 unused systemd: Starting Cleaning Up and Shutting Down Daemons... >Oct 29 11:23:53 unused systemd: Stopping Cleaning Up and Shutting Down Daemons... >Oct 29 11:23:53 unused systemd: Starting Plymouth switch root service... >Oct 29 11:23:53 unused systemd: Stopped Cleaning Up and Shutting Down Daemons. >Oct 29 11:23:53 unused systemd: Stopping dracut pre-pivot and cleanup hook... >Oct 29 11:23:53 unused systemd: Stopped dracut pre-pivot and cleanup hook. >Oct 29 11:23:53 unused systemd: Stopping Remote File Systems. >Oct 29 11:23:53 unused systemd: Stopped target Remote File Systems. >Oct 29 11:23:53 unused systemd: Stopping Remote File Systems (Pre). >Oct 29 11:23:53 unused systemd: Stopped target Remote File Systems (Pre). >Oct 29 11:23:53 unused systemd: Stopping dracut initqueue hook... >Oct 29 11:23:53 unused systemd: Stopped dracut initqueue hook. >Oct 29 11:23:53 unused systemd: Stopping Initrd Default Target. >Oct 29 11:23:53 unused systemd: Stopped target Initrd Default Target. >Oct 29 11:23:53 unused systemd: Stopping Basic System. >Oct 29 11:23:53 unused systemd: Stopped target Basic System. >Oct 29 11:23:53 unused systemd: Stopping Slices. >Oct 29 11:23:53 unused systemd: Stopped target Slices. >Oct 29 11:23:53 unused systemd: Stopping Paths. >Oct 29 11:23:53 unused systemd: Stopped target Paths. >Oct 29 11:23:53 unused systemd: Stopping Timers. >Oct 29 11:23:53 unused systemd: Stopped target Timers. >Oct 29 11:23:53 unused systemd: Stopping Sockets. >Oct 29 11:23:53 unused systemd: Stopped target Sockets. >Oct 29 11:23:53 unused systemd: Stopping System Initialization. >Oct 29 11:23:53 unused systemd: Stopped target System Initialization. >Oct 29 11:23:53 unused systemd: Stopping Apply Kernel Variables... >Oct 29 11:23:53 unused systemd: Stopped Apply Kernel Variables. >Oct 29 11:23:53 unused systemd: Stopping udev Coldplug all Devices... >Oct 29 11:23:53 unused systemd: Stopped udev Coldplug all Devices. >Oct 29 11:23:53 unused systemd: Stopping Swap. >Oct 29 11:23:53 unused systemd: Stopped target Swap. >Oct 29 11:23:53 unused systemd: Stopping Local File Systems. >Oct 29 11:23:53 unused systemd: Stopped target Local File Systems. >Oct 29 11:23:53 unused systemd: Stopping udev Kernel Device Manager... >Oct 29 11:23:53 unused systemd: Stopped udev Kernel Device Manager. >Oct 29 11:23:53 unused systemd: Stopping dracut pre-udev hook... >Oct 29 11:23:53 unused systemd: Stopped dracut pre-udev hook. >Oct 29 11:23:53 unused systemd: Stopping dracut cmdline hook... >Oct 29 11:23:53 unused systemd: Stopped dracut cmdline hook. >Oct 29 11:23:53 unused systemd: Stopping Create static device nodes in /dev... >Oct 29 11:23:53 unused systemd: Stopped Create static device nodes in /dev. >Oct 29 11:23:53 unused systemd: Stopping Create list of required static device nodes for the current kernel... >Oct 29 11:23:53 unused systemd: Stopped Create list of required static device nodes for the current kernel. >Oct 29 11:23:53 unused systemd: Stopping udev Kernel Socket. >Oct 29 11:23:53 unused systemd: Closed udev Kernel Socket. >Oct 29 11:23:53 unused systemd: Stopping udev Control Socket. >Oct 29 11:23:53 unused systemd: Closed udev Control Socket. >Oct 29 11:23:53 unused systemd: Starting Cleanup udevd DB... >Oct 29 11:23:53 unused systemd: Started Cleanup udevd DB. >Oct 29 11:23:53 unused systemd: Starting Switch Root. >Oct 29 11:23:53 unused systemd: Reached target Switch Root. >Oct 29 11:23:53 unused systemd: Started Plymouth switch root service. >Oct 29 11:23:53 unused systemd: Starting Switch Root... >Oct 29 11:23:53 unused systemd: Switching root. >Oct 29 11:23:53 unused journal: Journal stopped >Oct 29 11:23:57 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:23:57 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:23:57 unused systemd-journald[109]: Received SIGTERM >Oct 29 11:23:57 unused systemd-cgroups-agent[464]: Failed to get D-Bus connection: Unknown error -1 >Oct 29 11:23:57 unused kernel: type=1404 audit(1414553033.647:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 >Oct 29 11:23:57 unused kernel: type=1403 audit(1414553033.899:3): policy loaded auid=4294967295 ses=4294967295 >Oct 29 11:23:57 unused systemd[1]: Successfully loaded SELinux policy in 288.670ms. >Oct 29 11:23:57 unused systemd[1]: Relabelled /dev and /run in 21.119ms. >Oct 29 11:23:57 unused systemd[1]: Unknown kernel switch systemd.debug. Ignoring. >Oct 29 11:23:57 unused systemd[1]: Supported kernel switches: >Oct 29 11:23:57 unused systemd[1]: systemd.unit=UNIT Default unit to start >Oct 29 11:23:57 unused systemd[1]: rd.systemd.unit=UNIT Default unit to start when run in initrd >Oct 29 11:23:57 unused systemd[1]: systemd.dump_core=0|1 Dump core on crash >Oct 29 11:23:57 unused systemd[1]: systemd.crash_shell=0|1 Run shell on crash >Oct 29 11:23:57 unused systemd[1]: systemd.crash_chvt=N Change to VT #N on crash >Oct 29 11:23:57 unused systemd[1]: systemd.confirm_spawn=0|1 Confirm every process spawn >Oct 29 11:23:57 unused systemd[1]: systemd.show_status=0|1 Show status updates on the console during bootup >Oct 29 11:23:57 unused systemd[1]: systemd.log_target=console|kmsg|journal|journal-or-kmsg|syslog|syslog-or-kmsg|null >Oct 29 11:23:57 unused systemd[1]: Log target >Oct 29 11:23:57 unused systemd[1]: systemd.log_level=LEVEL Log level >Oct 29 11:23:57 unused systemd[1]: systemd.log_color=0|1 Highlight important log messages >Oct 29 11:23:57 unused systemd[1]: systemd.log_location=0|1 Include code location in log messages >Oct 29 11:23:57 unused systemd[1]: systemd.default_standard_output=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 11:23:57 unused systemd[1]: Set default log output for services >Oct 29 11:23:57 unused systemd[1]: systemd.default_standard_error=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 11:23:57 unused systemd[1]: Set default log error output for services >Oct 29 11:23:57 unused systemd[1]: systemd.setenv=ASSIGNMENT Set an environment variable for all spawned processes >Oct 29 11:23:57 unused journal: Journal started >Oct 29 11:23:57 unused systemd: systemd 208 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ) >Oct 29 11:23:57 unused systemd: Detected virtualization 'kvm'. >Oct 29 11:23:57 unused systemd: Set hostname to <unused>. >Oct 29 11:23:57 unused systemd: /usr/lib/systemd/system-generators/anaconda-generator exited with exit status 1. >Oct 29 11:23:57 unused systemd: [/usr/lib/systemd/system/lvm2-lvmetad.socket:9] Unknown lvalue 'RemoveOnStop' in section 'Socket' >Oct 29 11:23:57 unused systemd: [/usr/lib/systemd/system/dm-event.socket:10] Unknown lvalue 'RemoveOnStop' in section 'Socket' >Oct 29 11:23:57 unused systemd: Starting LVM2 metadata daemon... >Oct 29 11:23:57 unused systemd: Started LVM2 metadata daemon. >Oct 29 11:23:57 unused systemd: Started udev Coldplug all Devices. >Oct 29 11:23:57 unused systemd: Started Load/Save Random Seed. >Oct 29 11:23:57 unused systemd: Starting udev Wait for Complete Device Initialization... >Oct 29 11:23:58 unused systemd: Started Configure read-only root support. >Oct 29 11:23:58 unused systemd: Started Import network configuration from initramfs. >Oct 29 11:23:58 unused lvm: 2 logical volume(s) in volume group "rhel_unused" monitored >Oct 29 11:23:58 unused systemd: Started Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. >Oct 29 11:23:58 unused systemd: Started Create static device nodes in /dev. >Oct 29 11:23:58 unused systemd: Starting udev Kernel Device Manager... >Oct 29 11:23:58 unused systemd: Starting Local File Systems (Pre). >Oct 29 11:23:58 unused systemd: Reached target Local File Systems (Pre). >Oct 29 11:23:59 unused systemd: Started udev Kernel Device Manager. >Oct 29 11:23:59 unused systemd-udevd[533]: starting version 208 >Oct 29 11:23:59 unused systemd: Started udev Wait for Complete Device Initialization. >Oct 29 11:23:59 unused systemd: Starting Activation of DM RAID sets... >Oct 29 11:24:00 unused systemd: Found device /dev/ttyS0. >Oct 29 11:24:00 unused kernel: input: PC Speaker as /devices/platform/pcspkr/input/input4 >Oct 29 11:24:00 unused kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 >Oct 29 11:24:00 unused kernel: ppdev: user-space parallel port driver >Oct 29 11:24:00 unused kernel: alg: No test for __gcm-aes-aesni (__driver-gcm-aes-aesni) >Oct 29 11:24:00 unused systemd: Started Activation of DM RAID sets. >Oct 29 11:24:00 unused systemd: Starting Encrypted Volumes. >Oct 29 11:24:00 unused mtp-probe: checking bus 1, device 2: "/sys/devices/pci0000:00/0000:00:03.0/usb1/1-1" >Oct 29 11:24:00 unused mtp-probe: bus: 1, device: 2 was not an MTP device >Oct 29 11:24:00 unused systemd: Reached target Encrypted Volumes. >Oct 29 11:24:00 unused kernel: alg: No test for crc32 (crc32-pclmul) >Oct 29 11:24:00 unused systemd: Starting LVM2 PV scan on device 8:2... >Oct 29 11:24:01 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 29 11:24:01 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 29 11:24:01 unused systemd: Found device /dev/mapper/rhel_unused-swap. >Oct 29 11:24:01 unused systemd: Activating swap /dev/mapper/rhel_unused-swap... >Oct 29 11:24:01 unused lvm: 2 logical volume(s) in volume group "rhel_unused" now active >Oct 29 11:24:01 unused kernel: Adding 2097148k swap on /dev/mapper/rhel_unused-swap. Priority:-1 extents:1 across:2097148k FS >Oct 29 11:24:01 unused systemd: Found device QEMU_HARDDISK. >Oct 29 11:24:01 unused systemd: Mounting /boot... >Oct 29 11:24:01 unused systemd: Started LVM2 PV scan on device 8:2. >Oct 29 11:24:01 unused kernel: XFS (sda1): Mounting V4 Filesystem >Oct 29 11:24:01 unused systemd: Activated swap /dev/mapper/rhel_unused-swap. >Oct 29 11:24:01 unused systemd: Starting Swap. >Oct 29 11:24:02 unused systemd: Reached target Swap. >Oct 29 11:24:09 unused kernel: XFS (sda1): Ending clean mount >Oct 29 11:24:09 unused systemd: Mounted /boot. >Oct 29 11:24:09 unused systemd: Starting Local File Systems. >Oct 29 11:24:09 unused systemd: Reached target Local File Systems. >Oct 29 11:24:09 unused systemd: Started Mark the need to relabel after reboot. >Oct 29 11:24:09 unused systemd: Started Relabel all filesystems, if necessary. >Oct 29 11:24:09 unused systemd: Started Reconfigure the system on administrator request. >Oct 29 11:24:09 unused systemd: Starting Create Volatile Files and Directories... >Oct 29 11:24:09 unused systemd: Starting Tell Plymouth To Write Out Runtime Data... >Oct 29 11:24:09 unused systemd: Started Create Volatile Files and Directories. >Oct 29 11:24:09 unused systemd: Starting Security Auditing Service... >Oct 29 11:24:09 unused systemd: Started Tell Plymouth To Write Out Runtime Data. >Oct 29 11:24:10 unused auditd[618]: Started dispatcher: /sbin/audispd pid: 629 >Oct 29 11:24:10 unused kernel: type=1305 audit(1414553050.161:4): audit_pid=618 old=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 >Oct 29 11:24:10 unused augenrules: /sbin/augenrules: No change >Oct 29 11:24:10 unused auditd[618]: Init complete, auditd 2.4 listening for events (startup state enable) >Oct 29 11:24:10 unused audispd: audispd initialized with q_depth=150 and 1 active plugins >Oct 29 11:24:10 unused augenrules: No rules >Oct 29 11:24:10 unused augenrules: enabled 1 >Oct 29 11:24:10 unused augenrules: flag 1 >Oct 29 11:24:10 unused augenrules: pid 618 >Oct 29 11:24:10 unused augenrules: rate_limit 0 >Oct 29 11:24:10 unused augenrules: backlog_limit 320 >Oct 29 11:24:10 unused augenrules: lost 0 >Oct 29 11:24:10 unused augenrules: backlog 1 >Oct 29 11:24:10 unused systemd: Started Security Auditing Service. >Oct 29 11:24:10 unused systemd: Starting Update UTMP about System Reboot/Shutdown... >Oct 29 11:24:10 unused systemd: Started Update UTMP about System Reboot/Shutdown. >Oct 29 11:24:10 unused systemd: Starting System Initialization. >Oct 29 11:24:10 unused systemd: Reached target System Initialization. >Oct 29 11:24:10 unused systemd: Starting Daily Cleanup of Temporary Directories. >Oct 29 11:24:10 unused systemd: Started Daily Cleanup of Temporary Directories. >Oct 29 11:24:10 unused systemd: Starting Timers. >Oct 29 11:24:10 unused systemd: Reached target Timers. >Oct 29 11:24:10 unused systemd: Starting Open-iSCSI iscsid Socket. >Oct 29 11:24:10 unused systemd: Listening on Open-iSCSI iscsid Socket. >Oct 29 11:24:10 unused systemd: Starting Open-iSCSI iscsiuio Socket. >Oct 29 11:24:10 unused systemd: Listening on Open-iSCSI iscsiuio Socket. >Oct 29 11:24:10 unused systemd: Starting RPCbind Server Activation Socket. >Oct 29 11:24:11 unused systemd: Listening on RPCbind Server Activation Socket. >Oct 29 11:24:11 unused systemd: Starting Avahi mDNS/DNS-SD Stack Activation Socket. >Oct 29 11:24:11 unused systemd: Listening on Avahi mDNS/DNS-SD Stack Activation Socket. >Oct 29 11:24:11 unused systemd: Starting Flexible branding. >Oct 29 11:24:11 unused systemd: Started Flexible branding. >Oct 29 11:24:11 unused systemd: Starting Paths. >Oct 29 11:24:11 unused systemd: Reached target Paths. >Oct 29 11:24:11 unused systemd: Starting D-Bus System Message Bus Socket. >Oct 29 11:24:11 unused systemd: Listening on D-Bus System Message Bus Socket. >Oct 29 11:24:11 unused systemd: Starting Sockets. >Oct 29 11:24:11 unused systemd: Reached target Sockets. >Oct 29 11:24:11 unused systemd: Starting Basic System. >Oct 29 11:24:11 unused systemd: Reached target Basic System. >Oct 29 11:24:11 unused systemd: Starting firewalld - dynamic firewall daemon... >Oct 29 11:24:12 unused systemd: Started Load CPU microcode update. >Oct 29 11:24:12 unused systemd: Starting Dump dmesg to /var/log/dmesg... >Oct 29 11:24:12 unused systemd: Started Software RAID monitoring and management. >Oct 29 11:24:12 unused systemd: Starting libstoragemgmt plug-in server daemon... >Oct 29 11:24:12 unused systemd: Started libstoragemgmt plug-in server daemon. >Oct 29 11:24:12 unused systemd: Starting Avahi mDNS/DNS-SD Stack... >Oct 29 11:24:13 unused systemd: Starting NTP client/server... >Oct 29 11:24:13 unused systemd: Starting Kernel Samepage Merging... >Oct 29 11:24:13 unused systemd: Starting Rollback uncommitted netcf network config change transactions... >Oct 29 11:24:13 unused systemd: Starting System Logging Service... >Oct 29 11:24:14 unused netcf-transaction.sh: Running start: No pending transaction to rollback >Oct 29 11:24:14 unused systemd: Starting Resets System Activity Logs... >Oct 29 11:24:14 unused systemd: Starting Self Monitoring and Reporting Technology (SMART) Daemon... >Oct 29 11:24:14 unused avahi-daemon[648]: Found user 'avahi' (UID 70) and group 'avahi' (GID 70). >Oct 29 11:24:14 unused avahi-daemon[648]: Successfully dropped root privileges. >Oct 29 11:24:14 unused avahi-daemon[648]: avahi-daemon 0.6.31 starting up. >Oct 29 11:24:14 unused avahi-daemon[648]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns! >Oct 29 11:24:14 unused systemd: Started Self Monitoring and Reporting Technology (SMART) Daemon. >Oct 29 11:24:14 unused systemd: Starting Dynamic System Tuning Daemon... >Oct 29 11:24:14 unused systemd: Starting Hardware RNG Entropy Gatherer Daemon... >Oct 29 11:24:14 unused systemd: Started Hardware RNG Entropy Gatherer Daemon. >Oct 29 11:24:15 unused systemd: Started OpenSSH Server Key Generation. >Oct 29 11:24:15 unused systemd: Starting irqbalance daemon... >Oct 29 11:24:15 unused rngd: Unable to open file: /dev/tpm0 >Oct 29 11:24:15 unused rngd: can't open any entropy source >Oct 29 11:24:15 unused rngd: Maybe RNG device modules are not loaded >Oct 29 11:24:15 unused chronyd[667]: chronyd version 1.29.1 starting >Oct 29 11:24:15 unused systemd: Started irqbalance daemon. >Oct 29 11:24:15 unused systemd: Starting Login Service... >Oct 29 11:24:15 unused chronyd[667]: Linux kernel major=3 minor=10 patch=0 >Oct 29 11:24:15 unused chronyd[667]: hz=100 shift_hz=7 freq_scale=1.00000000 nominal_tick=10000 slew_delta_tick=833 max_tick_bias=1000 shift_pll=2 >Oct 29 11:24:15 unused systemd: Starting Accounts Service... >Oct 29 11:24:15 unused systemd: Starting RealtimeKit Scheduling Policy Service... >Oct 29 11:24:15 unused smartd[659]: smartd 6.2 2013-07-26 r3841 [x86_64-linux-3.10.0-196.el7.x86_64] (local build) >Oct 29 11:24:15 unused smartd[659]: Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org >Oct 29 11:24:15 unused smartd[659]: Opened configuration file /etc/smartmontools/smartd.conf >Oct 29 11:24:15 unused smartd[659]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices >Oct 29 11:24:15 unused smartd[659]: Device: /dev/sda, opened >Oct 29 11:24:15 unused smartd[659]: Device: /dev/sda, [QEMU QEMU HARDDISK 2.1.], 21.4 GB >Oct 29 11:24:15 unused smartd[659]: Device: /dev/sda, Bad IEC (SMART) mode page, err=5, skip device >Oct 29 11:24:15 unused smartd[659]: Monitoring 0 ATA and 0 SCSI devices >Oct 29 11:24:15 unused chronyd[667]: Frequency 1.215 +/- 0.198 ppm read from /var/lib/chrony/drift >Oct 29 11:24:16 unused systemd: Starting D-Bus System Message Bus... >Oct 29 11:24:16 unused systemd: Started D-Bus System Message Bus. >Oct 29 11:24:16 unused systemd: Started Dump dmesg to /var/log/dmesg. >Oct 29 11:24:16 unused systemd: Started Kernel Samepage Merging. >Oct 29 11:24:16 unused systemd: Started Rollback uncommitted netcf network config change transactions. >Oct 29 11:24:16 unused systemd: Started Resets System Activity Logs. >Oct 29 11:24:16 unused systemd: rngd.service: main process exited, code=exited, status=1/FAILURE >Oct 29 11:24:16 unused systemd: Unit rngd.service entered failed state. >Oct 29 11:24:16 unused systemd: Starting Kernel Samepage Merging (KSM) Tuning Daemon... >Oct 29 11:24:16 unused systemd: Started System Logging Service. >Oct 29 11:24:16 unused systemd: Started Kernel Samepage Merging (KSM) Tuning Daemon. >Oct 29 11:24:16 unused systemd: Started NTP client/server. >Oct 29 11:24:18 unused dbus-daemon: dbus[675]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:24:18 unused dbus[675]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:24:18 unused systemd: Started Avahi mDNS/DNS-SD Stack. >Oct 29 11:24:18 unused avahi-daemon[648]: Successfully called chroot(). >Oct 29 11:24:18 unused avahi-daemon[648]: Successfully dropped remaining capabilities. >Oct 29 11:24:18 unused avahi-daemon[648]: No service file found in /etc/avahi/services. >Oct 29 11:24:18 unused avahi-daemon[648]: Network interface enumeration completed. >Oct 29 11:24:18 unused avahi-daemon[648]: Registering HINFO record with values 'X86_64'/'LINUX'. >Oct 29 11:24:18 unused avahi-daemon[648]: Server startup complete. Host name is unused.local. Local service cookie is 1642189832. >Oct 29 11:24:18 unused systemd: Started RealtimeKit Scheduling Policy Service. >Oct 29 11:24:18 unused systemd-logind: New seat seat0. >Oct 29 11:24:18 unused systemd: Started Login Service. >Oct 29 11:24:18 unused systemd-logind: Watching system buttons on /dev/input/event0 (Power Button) >Oct 29 11:24:18 unused dbus-daemon: dbus[675]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Oct 29 11:24:18 unused dbus[675]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Oct 29 11:24:18 unused systemd: Starting Authorization Manager... >Oct 29 11:24:19 unused polkitd[714]: Started polkitd version 0.112 >Oct 29 11:24:19 unused dbus-daemon: dbus[675]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Oct 29 11:24:19 unused dbus[675]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Oct 29 11:24:19 unused systemd: Started Authorization Manager. >Oct 29 11:24:19 unused accounts-daemon[669]: started daemon version 0.6.35 >Oct 29 11:24:19 unused systemd: Started Accounts Service. >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused kernel: ip_tables: (C) 2000-2006 Netfilter Core Team >Oct 29 11:24:19 unused systemd: Started Dynamic System Tuning Daemon. >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:19 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused kernel: nf_conntrack version 0.5.0 (16384 buckets, 65536 max) >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused kernel: Ebtables v2.0 registered >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused kernel: Bridge firewalling registered >Oct 29 11:24:20 unused systemd: Started firewalld - dynamic firewall daemon. >Oct 29 11:24:20 unused systemd: Starting Network Manager... >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:20 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused NetworkManager[796]: <info> NetworkManager (version 0.9.9.1-42.git20140326.4dba720.el7) is starting... >Oct 29 11:24:21 unused NetworkManager[796]: <info> Read config: /etc/NetworkManager/NetworkManager.conf and conf.d: 10-ibft-plugin.conf, 00-server.conf >Oct 29 11:24:21 unused NetworkManager[796]: <info> WEXT support is disabled >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused kernel: cfg80211: Calling CRDA to update world regulatory domain >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused NetworkManager[796]: <info> VPN: loaded org.freedesktop.NetworkManager.libreswan >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused kernel: cfg80211: World regulatory domain updated: >Oct 29 11:24:21 unused kernel: cfg80211: DFS Master region: unset >Oct 29 11:24:21 unused kernel: cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time) >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused kernel: cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:24:21 unused kernel: cfg80211: (2457000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:24:21 unused kernel: cfg80211: (2474000 KHz - 2494000 KHz @ 20000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:24:21 unused kernel: cfg80211: (5170000 KHz - 5250000 KHz @ 160000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:24:21 unused kernel: cfg80211: (5250000 KHz - 5330000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s) >Oct 29 11:24:21 unused kernel: cfg80211: (5490000 KHz - 5730000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s) >Oct 29 11:24:21 unused kernel: cfg80211: (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:24:21 unused kernel: cfg80211: (57240000 KHz - 63720000 KHz @ 2160000 KHz), (N/A, 0 mBm), (N/A) >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused NetworkManager[796]: ifcfg-rh: Acquired D-Bus service com.redhat.ifcfgrh1 >Oct 29 11:24:21 unused NetworkManager[796]: <info> Loaded plugin ifcfg-rh: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused NetworkManager[796]: <info> Loaded plugin iBFT: (c) 2014 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 11:24:21 unused NetworkManager[796]: <info> Loaded plugin keyfile: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused NetworkManager[796]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:24:21 unused NetworkManager[796]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-ens5 ... >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused NetworkManager[796]: ifcfg-rh: read connection 'ens5' >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:21 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused NetworkManager[796]: <info> monitoring kernel firmware directory '/lib/firmware'. >Oct 29 11:24:22 unused NetworkManager[796]: <info> WiFi hardware radio set enabled >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused NetworkManager[796]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-adsl.so >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused NetworkManager[796]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-bluetooth.so >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused NetworkManager[796]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-wwan.so >Oct 29 11:24:22 unused NetworkManager[796]: <info> WiFi enabled by radio killswitch; enabled by state file >Oct 29 11:24:22 unused NetworkManager[796]: <info> WWAN enabled by radio killswitch; enabled by state file >Oct 29 11:24:22 unused NetworkManager[796]: <info> WiMAX enabled by radio killswitch; enabled by state file >Oct 29 11:24:22 unused NetworkManager[796]: <info> Networking is enabled by state file >Oct 29 11:24:22 unused NetworkManager[796]: <info> (lo): link connected >Oct 29 11:24:22 unused NetworkManager[796]: <info> (lo): carrier is ON (but ignored) >Oct 29 11:24:22 unused NetworkManager[796]: <info> (lo): new Generic device (driver: 'unknown' ifindex: 1) >Oct 29 11:24:22 unused NetworkManager[796]: <info> (lo): exported as /org/freedesktop/NetworkManager/Devices/0 >Oct 29 11:24:22 unused NetworkManager[796]: <info> (ens5): carrier is OFF (but ignored) >Oct 29 11:24:22 unused NetworkManager[796]: <info> (ens5): new Ethernet device (driver: 'e1000' ifindex: 2) >Oct 29 11:24:22 unused NetworkManager[796]: <info> (ens5): exported as /org/freedesktop/NetworkManager/Devices/1 >Oct 29 11:24:22 unused NetworkManager[796]: <info> (ens5): device state change: unmanaged -> unavailable (reason 'managed') [10 20 2] >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused NetworkManager[796]: <info> (ens5): preparing device >Oct 29 11:24:22 unused NetworkManager[796]: <info> (ens5): device state change: unavailable -> disconnected (reason 'none') [20 30 0] >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused systemd: Started Network Manager. >Oct 29 11:24:22 unused kernel: IPv6: ADDRCONF(NETDEV_UP): ens5: link is not ready >Oct 29 11:24:22 unused systemd: Starting LSB: Bring up/down networking... >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:22 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused NetworkManager[796]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:24:23 unused network: Bringing up loopback interface: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused NetworkManager[796]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:24:23 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused dbus-daemon: dbus[675]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:24:23 unused dbus[675]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused NetworkManager[796]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:24:23 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused NetworkManager[796]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:24:23 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused network: [ OK ] >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:23 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused NetworkManager[796]: <warn> Failed to activate 'ens5': Connection 'ens5' is not available on the device ens5 at this time. >Oct 29 11:24:24 unused NetworkManager[796]: <info> NetworkManager state is now DISCONNECTING >Oct 29 11:24:24 unused NetworkManager[796]: <info> NetworkManager state is now DISCONNECTED >Oct 29 11:24:24 unused network: Bringing up interface ens5: Error: Connection activation failed: Connection 'ens5' is not available on the device ens5 at this time. >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused network: [FAILED] >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused systemd: network.service: control process exited, code=exited status=1 >Oct 29 11:24:24 unused systemd: Failed to start LSB: Bring up/down networking. >Oct 29 11:24:24 unused systemd: Unit network.service entered failed state. >Oct 29 11:24:24 unused systemd: Starting Network. >Oct 29 11:24:24 unused systemd: Reached target Network. >Oct 29 11:24:24 unused systemd: Started Login and scanning of iSCSI devices. >Oct 29 11:24:24 unused systemd: Starting Remote File Systems (Pre). >Oct 29 11:24:24 unused systemd: Reached target Remote File Systems (Pre). >Oct 29 11:24:24 unused systemd: Starting Remote File Systems. >Oct 29 11:24:24 unused systemd: Reached target Remote File Systems. >Oct 29 11:24:24 unused systemd: Starting Trigger Flushing of Journal to Persistent Storage... >Oct 29 11:24:24 unused systemd: Starting Virtualization daemon... >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused systemd: Starting Enable periodic update of entitlement certificates.... >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused systemd: Starting Crash recovery kernel arming... >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused systemd: Starting Postfix Mail Transport Agent... >Oct 29 11:24:24 unused systemd: Starting OpenSSH server daemon... >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused systemd: Started OpenSSH server daemon. >Oct 29 11:24:24 unused systemd: Starting /etc/rc.d/rc.local Compatibility... >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused NetworkManager[796]: <info> (ens5): link connected >Oct 29 11:24:24 unused NetworkManager[796]: <info> Auto-activating connection 'ens5'. >Oct 29 11:24:24 unused NetworkManager[796]: <info> Activation (ens5) starting connection 'ens5' >Oct 29 11:24:24 unused NetworkManager[796]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) scheduled... >Oct 29 11:24:24 unused NetworkManager[796]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) started... >Oct 29 11:24:24 unused NetworkManager[796]: <info> (ens5): device state change: disconnected -> prepare (reason 'none') [30 40 0] >Oct 29 11:24:24 unused NetworkManager[796]: <info> NetworkManager state is now CONNECTING >Oct 29 11:24:24 unused NetworkManager[796]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) scheduled... >Oct 29 11:24:24 unused NetworkManager[796]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) complete. >Oct 29 11:24:24 unused NetworkManager[796]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) starting... >Oct 29 11:24:24 unused NetworkManager[796]: <info> (ens5): device state change: prepare -> config (reason 'none') [40 50 0] >Oct 29 11:24:24 unused NetworkManager[796]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) successful. >Oct 29 11:24:24 unused NetworkManager[796]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) complete. >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused kernel: e1000: ens5 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX >Oct 29 11:24:24 unused systemd: Starting LSB: Starts the Spacewalk Daemon... >Oct 29 11:24:24 unused kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens5: link becomes ready >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:24 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused systemd: Started Enable periodic update of entitlement certificates.. >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused rc.local: ens5: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 >Oct 29 11:24:25 unused rc.local: ether 9a:4e:4f:50:51:52 txqueuelen 1000 (Ethernet) >Oct 29 11:24:25 unused rc.local: RX packets 224 bytes 14519 (14.1 KiB) >Oct 29 11:24:25 unused rc.local: RX errors 0 dropped 0 overruns 0 frame 0 >Oct 29 11:24:25 unused rc.local: TX packets 0 bytes 0 (0.0 B) >Oct 29 11:24:25 unused rc.local: TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >Oct 29 11:24:25 unused rc.local: lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 >Oct 29 11:24:25 unused rc.local: inet 127.0.0.1 netmask 255.0.0.0 >Oct 29 11:24:25 unused rc.local: inet6 ::1 prefixlen 128 scopeid 0x10<host> >Oct 29 11:24:25 unused rc.local: loop txqueuelen 0 (Local Loopback) >Oct 29 11:24:25 unused rc.local: RX packets 12 bytes 1296 (1.2 KiB) >Oct 29 11:24:25 unused rc.local: RX errors 0 dropped 0 overruns 0 frame 0 >Oct 29 11:24:25 unused rc.local: TX packets 12 bytes 1296 (1.2 KiB) >Oct 29 11:24:25 unused rc.local: TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused systemd: Started Trigger Flushing of Journal to Persistent Storage. >Oct 29 11:24:25 unused systemd: Started /etc/rc.d/rc.local Compatibility. >Oct 29 11:24:25 unused systemd: Starting Permit User Sessions... >Oct 29 11:24:25 unused systemd: PID file /var/run/rhnsd.pid not readable (yet?) after start. >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused systemd: Failed to start LSB: Starts the Spacewalk Daemon. >Oct 29 11:24:25 unused systemd: Unit rhnsd.service entered failed state. >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused systemd: Started Permit User Sessions. >Oct 29 11:24:25 unused systemd: Starting Command Scheduler... >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:25 unused audispd: queue is full - dropping event >Oct 29 11:24:26 unused systemd: Started Command Scheduler. >Oct 29 11:24:26 unused systemd: Starting Job spooling tools... >Oct 29 11:24:26 unused audispd: queue is full - dropping event >Oct 29 11:24:26 unused systemd: Started Job spooling tools. >Oct 29 11:24:26 unused systemd: Starting Wait for Plymouth Boot Screen to Quit... >Oct 29 11:24:26 unused audispd: queue is full - dropping event >Oct 29 11:24:26 unused libvirtd: 2014-10-29 03:24:26.308+0000: 1279: info : libvirt version: 1.2.8, package: 4.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2014-09-26-08:45:32, x86-021.build.eng.bos.redhat.com) >Oct 29 11:24:26 unused libvirtd: 2014-10-29 03:24:26.308+0000: 1279: warning : virGetHostname:665 : getaddrinfo failed for 'unused': Name or service not known >Oct 29 11:24:26 unused systemd: Starting GNOME Display Manager... >Oct 29 11:24:27 unused systemd: Started GNOME Display Manager. >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused dbus[675]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.17" (uid=0 pid=1967 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.18" (uid=0 pid=2365 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Oct 29 11:24:27 unused dbus-daemon: dbus[675]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.17" (uid=0 pid=1967 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.18" (uid=0 pid=2365 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused NetworkManager[796]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) scheduled. >Oct 29 11:24:27 unused NetworkManager[796]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) started... >Oct 29 11:24:27 unused NetworkManager[796]: <info> (ens5): device state change: config -> ip-config (reason 'none') [50 70 0] >Oct 29 11:24:27 unused NetworkManager[796]: <info> Activation (ens5) Beginning DHCPv4 transaction (timeout in 45 seconds) >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused NetworkManager[796]: <info> dhclient started with pid 2449 >Oct 29 11:24:27 unused NetworkManager[796]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) complete. >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:27 unused audispd: queue is full - dropping event >Oct 29 11:24:28 unused NetworkManager[796]: <info> (ens5): DHCPv4 state changed nbi -> preinit >Oct 29 11:24:28 unused dhclient[2449]: DHCPREQUEST on ens5 to 255.255.255.255 port 67 (xid=0x4c93cc18) >Oct 29 11:24:28 unused dhclient[2449]: DHCPACK from 10.66.111.254 (xid=0x4c93cc18) >Oct 29 11:24:28 unused NetworkManager[796]: <info> (ens5): DHCPv4 state changed preinit -> reboot >Oct 29 11:24:28 unused dhclient[2449]: bound to 10.66.110.85 -- renewal in 5789 seconds. >Oct 29 11:24:28 unused NetworkManager[796]: <info> address 10.66.110.85 >Oct 29 11:24:28 unused NetworkManager[796]: <info> plen 21 (255.255.248.0) >Oct 29 11:24:28 unused NetworkManager[796]: <info> gateway 10.66.111.254 >Oct 29 11:24:28 unused NetworkManager[796]: <info> server identifier 10.66.78.111 >Oct 29 11:24:28 unused NetworkManager[796]: <info> lease time 14400 >Oct 29 11:24:28 unused NetworkManager[796]: <info> nameserver '10.66.78.111' >Oct 29 11:24:28 unused NetworkManager[796]: <info> nameserver '10.66.78.117' >Oct 29 11:24:28 unused NetworkManager[796]: <info> nameserver '10.66.127.10' >Oct 29 11:24:28 unused NetworkManager[796]: <info> domain name 'englab.nay.redhat.com' >Oct 29 11:24:28 unused NetworkManager[796]: <info> domain name 'qe.lab.eng.nay.redhat.com' >Oct 29 11:24:28 unused NetworkManager[796]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Configure Commit) scheduled... >Oct 29 11:24:28 unused NetworkManager[796]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Commit) started... >Oct 29 11:24:28 unused avahi-daemon[648]: Joining mDNS multicast group on interface ens5.IPv4 with address 10.66.110.85. >Oct 29 11:24:28 unused NetworkManager[796]: <info> (ens5): device state change: ip-config -> ip-check (reason 'none') [70 80 0] >Oct 29 11:24:28 unused NetworkManager[796]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Commit) complete. >Oct 29 11:24:28 unused NetworkManager[796]: <info> (ens5): device state change: ip-check -> secondaries (reason 'none') [80 90 0] >Oct 29 11:24:28 unused NetworkManager[796]: <info> (ens5): device state change: secondaries -> activated (reason 'none') [90 100 0] >Oct 29 11:24:28 unused NetworkManager[796]: <info> NetworkManager state is now CONNECTED_LOCAL >Oct 29 11:24:28 unused avahi-daemon[648]: New relevant interface ens5.IPv4 for mDNS. >Oct 29 11:24:28 unused avahi-daemon[648]: Registering new address record for 10.66.110.85 on ens5.IPv4. >Oct 29 11:24:28 unused NetworkManager[796]: <info> Policy set 'ens5' (ens5) as default for IPv4 routing and DNS. >Oct 29 11:24:28 unused NetworkManager[796]: <info> Activation (ens5) successful, device activated. >Oct 29 11:24:28 unused dbus[675]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Oct 29 11:24:28 unused kdumpctl: kexec: loaded kdump kernel >Oct 29 11:24:28 unused kdumpctl: Starting kdump: [OK] >Oct 29 11:24:28 unused systemd: Started Crash recovery kernel arming. >Oct 29 11:24:28 unused journal: libvirt version: 1.2.8, package: 4.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2014-09-26-08:45:32, x86-021.build.eng.bos.redhat.com) >Oct 29 11:24:28 unused journal: Module /usr/lib64/libvirt/connection-driver/libvirt_driver_lxc.so not accessible >Oct 29 11:24:28 unused dbus-daemon: dbus[675]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Oct 29 11:24:28 unused systemd: Starting Network Manager Script Dispatcher Service... >Oct 29 11:24:28 unused dbus-daemon: dbus[675]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Oct 29 11:24:28 unused dbus[675]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Oct 29 11:24:28 unused systemd: Started Network Manager Script Dispatcher Service. >Oct 29 11:24:28 unused systemd: Started Virtualization daemon. >Oct 29 11:24:28 unused systemd: Unit iscsi.service cannot be reloaded because it is inactive. >Oct 29 11:24:29 unused systemd: Started Postfix Mail Transport Agent. >Oct 29 11:24:29 unused setroubleshoot: Plugin Exception restorecon >Oct 29 11:24:29 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:24:29 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:29 unused avahi-daemon[648]: Registering new address record for fe80::984e:4fff:fe50:5152 on ens5.*. >Oct 29 11:24:29 unused NetworkManager[796]: <info> startup complete >Oct 29 11:24:29 unused setroubleshoot: Plugin Exception restorecon_source >Oct 29 11:24:29 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:24:29 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:29 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:24:29 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:30 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:24:30 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:30 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:24:30 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:30 unused systemd: Started Wait for Plymouth Boot Screen to Quit. >Oct 29 11:24:30 unused systemd: Starting Serial Getty on ttyS0... >Oct 29 11:24:30 unused systemd: Started Serial Getty on ttyS0. >Oct 29 11:24:30 unused systemd: Starting Login Prompts. >Oct 29 11:24:30 unused systemd: Reached target Login Prompts. >Oct 29 11:24:30 unused systemd: Starting Multi-User System. >Oct 29 11:24:30 unused systemd: Reached target Multi-User System. >Oct 29 11:24:30 unused systemd: Starting Graphical Interface. >Oct 29 11:24:30 unused systemd: Reached target Graphical Interface. >Oct 29 11:24:30 unused systemd: Starting Update UTMP about System Runlevel Changes... >Oct 29 11:24:30 unused systemd: Started Stop Read-Ahead Data Collection 10s After Completed Startup. >Oct 29 11:24:30 unused systemd: Started Update UTMP about System Runlevel Changes. >Oct 29 11:24:30 unused systemd: Startup finished in 797ms (kernel) + 2.097s (initrd) + 36.718s (userspace) = 39.614s. >Oct 29 11:24:30 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4232f3ec-5ccd-4850-ba76-4a70ff4565b6 >Oct 29 11:24:30 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:30 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 29 11:24:30 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:30 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 29 11:24:30 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:30 unused systemd: Starting user-42.slice. >Oct 29 11:24:30 unused systemd: Created slice user-42.slice. >Oct 29 11:24:30 unused systemd: Starting Session c1 of user gdm. >Oct 29 11:24:30 unused systemd-logind: New session c1 of user gdm. >Oct 29 11:24:30 unused systemd: Started Session c1 of user gdm. >Oct 29 11:24:30 unused systemd-logind: Linked /tmp/.X11-unix/X0 to /run/user/42/X11-display. >Oct 29 11:24:30 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f60195bb-d64d-4eb0-a8f4-cf8a2b920ac8 >Oct 29 11:24:30 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:30 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5ab16217-4ece-422d-83ed-2d510b7f6e4a >Oct 29 11:24:30 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l adc127d5-3ba3-4600-a18a-c60d41d563f5 >Oct 29 11:24:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:24:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 06db745f-002f-4e84-a79a-b463031747bc >Oct 29 11:24:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 06db745f-002f-4e84-a79a-b463031747bc >Oct 29 11:24:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:24:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8a2839f5-9652-4d11-b7f0-45cf9ee50720 >Oct 29 11:24:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:24:31 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:31 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:24:32 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:32 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l bb129500-3477-472a-b1a1-1b7d123c1da8 >Oct 29 11:24:32 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:32 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d95da5c3-8c53-450d-a9b2-dfb19b652de8 >Oct 29 11:24:32 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:32 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l db8f5c38-2bac-4875-a619-b204531cc812 >Oct 29 11:24:32 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:32 unused dbus-daemon: dbus[675]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Oct 29 11:24:32 unused dbus[675]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Oct 29 11:24:32 unused systemd: Starting Daemon for power management... >Oct 29 11:24:32 unused dbus-daemon: dbus[675]: [system] Successfully activated service 'org.freedesktop.UPower' >Oct 29 11:24:32 unused dbus[675]: [system] Successfully activated service 'org.freedesktop.UPower' >Oct 29 11:24:32 unused systemd: Started Daemon for power management. >Oct 29 11:24:32 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 149193bb-28ed-4b94-9604-5e107a9da7e2 >Oct 29 11:24:32 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:32 unused gnome-session: (gnome-settings-daemon:2854): power-plugin-WARNING **: failed to turn the panel on: Display is not DPMS capable >Oct 29 11:24:32 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2003831-eae3-45bc-9b03-1dd96a73f949 >Oct 29 11:24:32 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:32 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d95da5c3-8c53-450d-a9b2-dfb19b652de8 >Oct 29 11:24:32 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:32 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:24:32 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:33 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5ab16217-4ece-422d-83ed-2d510b7f6e4a >Oct 29 11:24:33 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:33 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 11:24:33 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:33 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 41005440-a55b-4233-93f3-db86ea99daba >Oct 29 11:24:33 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:33 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l af15d032-e5b6-477a-a4e0-d0db84c92e84 >Oct 29 11:24:33 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:33 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l af15d032-e5b6-477a-a4e0-d0db84c92e84 >Oct 29 11:24:33 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:33 unused dbus-daemon: dbus[675]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Oct 29 11:24:33 unused dbus[675]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Oct 29 11:24:33 unused gnome-session: Entering running state >Oct 29 11:24:33 unused systemd: Starting Manage, Install and Generate Color Profiles... >Oct 29 11:24:33 unused colord: Using config file /etc/colord.conf >Oct 29 11:24:33 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 75ef4f58-c198-49a6-9668-ae14c8a7007b >Oct 29 11:24:33 unused colord: Using mapping database file /var/lib/colord/mapping.db >Oct 29 11:24:33 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:33 unused colord: Using device database file /var/lib/colord/storage.db >Oct 29 11:24:33 unused colord: loaded plugin libcd_plugin_camera.so >Oct 29 11:24:33 unused colord: loaded plugin libcd_plugin_scanner.so >Oct 29 11:24:33 unused colord: Daemon ready for requests >Oct 29 11:24:33 unused dbus-daemon: dbus[675]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Oct 29 11:24:33 unused dbus[675]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Oct 29 11:24:33 unused systemd: Started Manage, Install and Generate Color Profiles. >Oct 29 11:24:33 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b91b4263-e2c9-413f-9c5f-7869cacdb578 >Oct 29 11:24:33 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:33 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 97aea7ca-00fe-4e40-af8e-e0ec40282528 >Oct 29 11:24:33 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:34 unused colord: Profile added: icc-021ec903471f953c28c57ccde43f9134 >Oct 29 11:24:34 unused colord: Profile added: icc-7e1e684edc9a0671f5305d656d8cb8c9 >Oct 29 11:24:34 unused colord: Profile added: icc-0f6451e33e7342d0f90bb960912bb812 >Oct 29 11:24:34 unused colord: Profile added: icc-8f465237bb45ee1d16fdbd6b4038c719 >Oct 29 11:24:34 unused colord: Profile added: icc-8daff74b7142df23f76b3d5ef126bbf9 >Oct 29 11:24:34 unused colord: Profile added: icc-f16a3fe7a0d2f471188cf45202ae43ac >Oct 29 11:24:34 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 94cf47a7-5a5c-405c-ab69-1601b787f238 >Oct 29 11:24:34 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:34 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 05d5fa63-cbd7-453f-b673-c378b16914f0 >Oct 29 11:24:34 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:34 unused rtkit-daemon[674]: Successfully made thread 3126 of process 3126 (/usr/bin/pulseaudio) owned by '42' high priority at nice level -11. >Oct 29 11:24:34 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:24:34 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:34 unused dbus-daemon: dbus[675]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 29 11:24:34 unused dbus[675]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 29 11:24:34 unused systemd: Starting Locale Service... >Oct 29 11:24:34 unused gnome-session: (gnome-settings-daemon:2854): color-plugin-WARNING **: failed to get edid: unable to get EDID for output >Oct 29 11:24:34 unused dbus-daemon: dbus[675]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 29 11:24:34 unused dbus[675]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 29 11:24:34 unused systemd: Started Locale Service. >Oct 29 11:24:34 unused colord: Device added: xrandr-Virtual-0 >Oct 29 11:24:34 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:24:34 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:34 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:24:34 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:34 unused gnome-session: (gnome-settings-daemon:2854): color-plugin-WARNING **: unable to get EDID for xrandr-Virtual-0: unable to get EDID for output >Oct 29 11:24:34 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8a64fd6d-c54b-4627-b7b5-44f0b14979dd >Oct 29 11:24:34 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:34 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 396a1310-4088-41c8-90a8-d43b4f19499c >Oct 29 11:24:34 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:35 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 396a1310-4088-41c8-90a8-d43b4f19499c >Oct 29 11:24:35 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:35 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::primary after class was initialised >Oct 29 11:24:35 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::index after class was initialised >Oct 29 11:24:35 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d772382b-e332-4fba-8873-f558166b6023 >Oct 29 11:24:35 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:35 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2094586-a8f8-4bc1-af02-534887cfd2f4 >Oct 29 11:24:35 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:35 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2094586-a8f8-4bc1-af02-534887cfd2f4 >Oct 29 11:24:35 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:35 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0b13c0cf-312e-4166-b485-88d815f566fb >Oct 29 11:24:35 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:35 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b427ecb2-8229-4dc3-b9ee-ffea01dcd104 >Oct 29 11:24:35 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:35 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:24:35 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:35 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0e7f911c-862c-4a1b-bdef-924387d5c7e9 >Oct 29 11:24:35 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:36 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:24:36 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:36 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 04b4c9d6-e337-439c-bb70-255a7898dcb3 >Oct 29 11:24:36 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:36 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:24:36 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:36 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5f10f707-7a84-461f-9e81-f835d4ea195d >Oct 29 11:24:36 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:36 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:24:36 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:36 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0e378e0b-9b3c-4d2f-84b9-ce2845665953 >Oct 29 11:24:36 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:36 unused gnome-session: JS LOG: GNOME Shell started at Wed Oct 29 2014 11:24:36 GMT+0800 (CST) >Oct 29 11:24:36 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b94cfdf3-87b2-4b6e-abf5-837aee9d5e47 >Oct 29 11:24:36 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:36 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:24:36 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:37 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 829d18ca-3d16-4e5a-8496-a95d9ab10d6c >Oct 29 11:24:37 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:37 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 63dc4b7a-9372-4551-bd5d-9f0980157bc4 >Oct 29 11:24:37 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:37 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l be15d920-943b-4dae-ab10-813bdf4c9056 >Oct 29 11:24:37 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:37 unused dbus-daemon: dbus[675]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Oct 29 11:24:37 unused dbus[675]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Oct 29 11:24:37 unused systemd: Starting Fingerprint Authentication Daemon... >Oct 29 11:24:37 unused dbus-daemon: dbus[675]: [system] Successfully activated service 'net.reactivated.Fprint' >Oct 29 11:24:37 unused dbus[675]: [system] Successfully activated service 'net.reactivated.Fprint' >Oct 29 11:24:37 unused systemd: Started Fingerprint Authentication Daemon. >Oct 29 11:24:37 unused fprintd: Launching FprintObject >Oct 29 11:24:37 unused fprintd: ** Message: D-Bus service launched with name: net.reactivated.Fprint >Oct 29 11:24:37 unused fprintd: ** Message: entering main loop >Oct 29 11:24:37 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:24:37 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:37 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f31e2e16-ef9a-43df-bba1-a28015fc34cb >Oct 29 11:24:37 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:37 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:24:37 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:37 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f31e2e16-ef9a-43df-bba1-a28015fc34cb >Oct 29 11:24:37 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:37 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:24:37 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:38 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:24:38 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:38 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:24:38 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:38 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:24:38 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:38 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:24:38 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:38 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 88a7869a-040a-4f0e-80c5-b6a4e8755bb3 >Oct 29 11:24:38 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:38 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:24:38 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:38 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:24:38 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:39 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l dc7e7c9b-7e67-4b25-821f-418ef1def3e4 >Oct 29 11:24:39 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:39 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:24:39 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:39 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:24:39 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:39 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:24:39 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:39 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8dd8c574-fc63-4b6f-9f6c-45c2df7870d4 >Oct 29 11:24:39 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:39 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 11:24:39 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:24:39 unused dbus-daemon: string index out of range >Oct 29 11:24:39 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 29 11:25:07 unused fprintd: ** Message: No devices in use, exit >Oct 29 11:25:16 unused systemd: Starting user-0.slice. >Oct 29 11:25:16 unused systemd: Created slice user-0.slice. >Oct 29 11:25:16 unused systemd: Starting Session 1 of user root. >Oct 29 11:25:16 unused systemd-logind: New session 1 of user root. >Oct 29 11:25:16 unused systemd: Started Session 1 of user root. >Oct 29 11:26:34 unused kernel: sr 0:0:1:0: device reset >Oct 29 11:26:34 unused kernel: sr 0:0:1:0: Device offlined - not ready after error recovery >Oct 29 11:26:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:36 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:38 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:40 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:42 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:44 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:46 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:48 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:50 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:52 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:54 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:57 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:26:59 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:01 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:03 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:05 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:07 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:09 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:11 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:13 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:15 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:17 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:19 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:21 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:23 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:25 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:27 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:29 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:31 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:33 unused chronyd[667]: Selected source 10.5.26.10 >Oct 29 11:27:33 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:36 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:38 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:40 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:42 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:44 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:46 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:48 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:50 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:52 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:54 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:56 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:27:58 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:01 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:03 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:05 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:07 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:09 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:11 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:13 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:15 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:17 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:19 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:21 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:23 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:25 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:27 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:29 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:31 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:33 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:35 unused chronyd[667]: Selected source 10.66.127.10 >Oct 29 11:28:35 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:37 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:39 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:42 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:44 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:46 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:48 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:50 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:52 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:54 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:56 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:28:58 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:00 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:04 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:06 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:08 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:10 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:12 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:14 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:16 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:18 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:20 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:22 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:25 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:27 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:29 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:31 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:33 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:35 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:37 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:39 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:41 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:43 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:45 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:47 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:49 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:51 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:53 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:55 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:57 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:29:59 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:01 unused dbus-daemon: Exception in thread Thread-1 (most likely raised during interpreter shutdown):dbus[675]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:30:01 unused dbus[675]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:30:01 unused systemd: Starting Session 2 of user root. >Oct 29 11:30:01 unused systemd: Started Session 2 of user root. >Oct 29 11:30:01 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:02 unused dbus-daemon: dbus[675]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:30:02 unused dbus[675]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:30:02 unused journal: Suppressed 2647 messages from /system.slice/dbus.service >Oct 29 11:30:03 unused setroubleshoot: Plugin Exception restorecon_source >Oct 29 11:30:03 unused setroubleshoot: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . For complete SELinux messages. run sealert -l 48fca7c8-976d-46e5-9bdc-8be5be60840d >Oct 29 11:30:03 unused python: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that prelink should be allowed setattr access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:30:03 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:05 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:08 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:10 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:12 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:13 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 29 11:30:14 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:16 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:18 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:20 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:22 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:24 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:26 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:28 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:30 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:32 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:36 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:38 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:40 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:42 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:44 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:46 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:48 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:51 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:53 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:55 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:57 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:30:59 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:01 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:03 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:05 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:07 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:09 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:11 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:13 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:15 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:17 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:19 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:21 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:23 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:25 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:27 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:29 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:31 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:34 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:36 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:38 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:40 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:42 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:44 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:46 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:48 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:49 unused chronyd[667]: Selected source 10.5.26.10 >Oct 29 11:31:50 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:52 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:54 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:56 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:31:58 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:32:00 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:32:02 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:32:04 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:32:06 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:32:08 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:32:10 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:32:12 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:32:14 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:32:17 unused kernel: sr 0:0:1:0: rejecting I/O to offline device >Oct 29 11:32:17 unused systemd: Stopping Session 1 of user root. >Oct 29 11:32:17 unused systemd: Stopping Session c1 of user gdm. >Oct 29 11:32:17 unused systemd: Stopping LVM2 PV scan on device 8:2... >Oct 29 11:32:17 unused systemd: Stopping system-getty.slice. >Oct 29 11:32:17 unused systemd: Removed slice system-getty.slice. >Oct 29 11:32:17 unused systemd: Stopping Dump dmesg to /var/log/dmesg... >Oct 29 11:32:17 unused systemd: Stopped Dump dmesg to /var/log/dmesg. >Oct 29 11:32:17 unused systemd: Stopping Graphical Interface. >Oct 29 11:32:17 unused systemd: Stopped target Graphical Interface. >Oct 29 11:32:17 unused systemd: Stopping Multi-User System. >Oct 29 11:32:17 unused systemd: Stopped target Multi-User System. >Oct 29 11:32:17 unused systemd: Stopping Command Scheduler... >Oct 29 11:32:17 unused systemd: Stopping libstoragemgmt plug-in server daemon... >Oct 29 11:32:17 unused systemd: Stopping Virtualization daemon... >Oct 29 11:32:17 unused rsyslogd: [origin software="rsyslogd" swVersion="7.4.7" x-pid="655" x-info="http://www.rsyslog.com"] exiting on signal 15. >Oct 29 11:32:52 unused rsyslogd: [origin software="rsyslogd" swVersion="7.4.7" x-pid="655" x-info="http://www.rsyslog.com"] start >Oct 29 11:32:34 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:32:34 unused kernel: Initializing cgroup subsys cpuset >Oct 29 11:32:34 unused kernel: Initializing cgroup subsys cpu >Oct 29 11:32:34 unused kernel: Initializing cgroup subsys cpuacct >Oct 29 11:32:34 unused kernel: Linux version 3.10.0-196.el7.x86_64 (mockbuild@x86-018.build.eng.bos.redhat.com) (gcc version 4.8.3 20140911 (Red Hat 4.8.3-7) (GCC) ) #1 SMP Tue Oct 28 11:16:22 EDT 2014 >Oct 29 11:32:34 unused kernel: Command line: BOOT_IMAGE=/vmlinuz-3.10.0-196.el7.x86_64 root=/dev/mapper/rhel_unused-root ro crashkernel=auto rd.lvm.lv=rhel_unused/root rd.lvm.lv=rhel_unused/swap console=tty0 console=ttyS0,115200 LANG=en_US.UTF-8 systemd.debug >Oct 29 11:32:34 unused kernel: e820: BIOS-provided physical RAM map: >Oct 29 11:32:34 unused kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable >Oct 29 11:32:34 unused kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved >Oct 29 11:32:34 unused kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved >Oct 29 11:32:34 unused kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdffff] usable >Oct 29 11:32:34 unused kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved >Oct 29 11:32:34 unused kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved >Oct 29 11:32:34 unused kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved >Oct 29 11:32:34 unused kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable >Oct 29 11:32:34 unused kernel: NX (Execute Disable) protection: active >Oct 29 11:32:34 unused kernel: SMBIOS 2.8 present. >Oct 29 11:32:34 unused kernel: Hypervisor detected: KVM >Oct 29 11:32:34 unused kernel: No AGP bridge found >Oct 29 11:32:34 unused kernel: e820: last_pfn = 0x140000 max_arch_pfn = 0x400000000 >Oct 29 11:32:34 unused kernel: x86 PAT enabled: cpu 0, old 0x7040600070406, new 0x7010600070106 >Oct 29 11:32:34 unused kernel: e820: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 >Oct 29 11:32:34 unused kernel: found SMP MP-table at [mem 0x000f2030-0x000f203f] mapped at [ffff8800000f2030] >Oct 29 11:32:34 unused kernel: init_memory_mapping: [mem 0x00000000-0x000fffff] >Oct 29 11:32:34 unused kernel: init_memory_mapping: [mem 0x13fe00000-0x13fffffff] >Oct 29 11:32:34 unused kernel: init_memory_mapping: [mem 0x13c000000-0x13fdfffff] >Oct 29 11:32:34 unused kernel: init_memory_mapping: [mem 0x100000000-0x13bffffff] >Oct 29 11:32:34 unused kernel: init_memory_mapping: [mem 0x00100000-0xbffdffff] >Oct 29 11:32:34 unused kernel: RAMDISK: [mem 0x35d2e000-0x36e8efff] >Oct 29 11:32:34 unused kernel: ACPI: RSDP 00000000000f1d90 00014 (v00 BOCHS ) >Oct 29 11:32:34 unused kernel: ACPI: RSDT 00000000bffe1931 00030 (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001) >Oct 29 11:32:34 unused kernel: ACPI: FACP 00000000bffe0b37 00074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001) >Oct 29 11:32:34 unused kernel: ACPI: DSDT 00000000bffe0040 00AF7 (v01 BOCHS BXPCDSDT 00000001 BXPC 00000001) >Oct 29 11:32:34 unused kernel: ACPI: FACS 00000000bffe0000 00040 >Oct 29 11:32:34 unused kernel: ACPI: SSDT 00000000bffe0bab 00CF6 (v01 BOCHS BXPCSSDT 00000001 BXPC 00000001) >Oct 29 11:32:34 unused kernel: ACPI: APIC 00000000bffe18a1 00090 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001) >Oct 29 11:32:34 unused kernel: No NUMA configuration found >Oct 29 11:32:34 unused kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] >Oct 29 11:32:34 unused kernel: Initmem setup node 0 [mem 0x00000000-0x13fffffff] >Oct 29 11:32:34 unused kernel: NODE_DATA [mem 0x13ffd6000-0x13fffcfff] >Oct 29 11:32:34 unused kernel: Reserving 161MB of memory at 688MB for crashkernel (System RAM: 4095MB) >Oct 29 11:32:34 unused kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 >Oct 29 11:32:34 unused kernel: kvm-clock: cpu 0, msr 1:3ff86001, primary cpu clock >Oct 29 11:32:34 unused kernel: Zone ranges: >Oct 29 11:32:34 unused kernel: DMA [mem 0x00001000-0x00ffffff] >Oct 29 11:32:34 unused kernel: DMA32 [mem 0x01000000-0xffffffff] >Oct 29 11:32:34 unused kernel: Normal [mem 0x100000000-0x13fffffff] >Oct 29 11:32:34 unused kernel: Movable zone start for each node >Oct 29 11:32:34 unused kernel: Early memory node ranges >Oct 29 11:32:34 unused kernel: node 0: [mem 0x00001000-0x0009efff] >Oct 29 11:32:34 unused kernel: node 0: [mem 0x00100000-0xbffdffff] >Oct 29 11:32:34 unused kernel: node 0: [mem 0x100000000-0x13fffffff] >Oct 29 11:32:34 unused kernel: ACPI: PM-Timer IO Port: 0x608 >Oct 29 11:32:34 unused kernel: ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled) >Oct 29 11:32:34 unused kernel: ACPI: LAPIC (acpi_id[0x01] lapic_id[0x01] enabled) >Oct 29 11:32:34 unused kernel: ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled) >Oct 29 11:32:34 unused kernel: ACPI: LAPIC (acpi_id[0x03] lapic_id[0x03] enabled) >Oct 29 11:32:34 unused kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) >Oct 29 11:32:34 unused kernel: ACPI: IOAPIC (id[0x00] address[0xfec00000] gsi_base[0]) >Oct 29 11:32:34 unused kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 >Oct 29 11:32:34 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) >Oct 29 11:32:34 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) >Oct 29 11:32:34 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) >Oct 29 11:32:34 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) >Oct 29 11:32:34 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) >Oct 29 11:32:34 unused kernel: Using ACPI (MADT) for SMP configuration information >Oct 29 11:32:34 unused kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs >Oct 29 11:32:34 unused kernel: PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff] >Oct 29 11:32:34 unused kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000effff] >Oct 29 11:32:34 unused kernel: PM: Registered nosave memory: [mem 0x000f0000-0x000fffff] >Oct 29 11:32:34 unused kernel: PM: Registered nosave memory: [mem 0xbffe0000-0xbfffffff] >Oct 29 11:32:34 unused kernel: PM: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] >Oct 29 11:32:34 unused kernel: PM: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] >Oct 29 11:32:34 unused kernel: PM: Registered nosave memory: [mem 0xff000000-0xfffbffff] >Oct 29 11:32:34 unused kernel: PM: Registered nosave memory: [mem 0xfffc0000-0xffffffff] >Oct 29 11:32:34 unused kernel: e820: [mem 0xc0000000-0xfeffbfff] available for PCI devices >Oct 29 11:32:34 unused kernel: Booting paravirtualized kernel on KVM >Oct 29 11:32:34 unused kernel: setup_percpu: NR_CPUS:5120 nr_cpumask_bits:4 nr_cpu_ids:4 nr_node_ids:1 >Oct 29 11:32:34 unused kernel: PERCPU: Embedded 29 pages/cpu @ffff88013fc00000 s86720 r8192 d23872 u524288 >Oct 29 11:32:34 unused kernel: KVM setup async PF for cpu 0 >Oct 29 11:32:34 unused kernel: kvm-stealtime: cpu 0, msr 13fc0e000 >Oct 29 11:32:34 unused kernel: Built 1 zonelists in Node order, mobility grouping on. Total pages: 1032041 >Oct 29 11:32:34 unused kernel: Policy zone: Normal >Oct 29 11:32:34 unused kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-3.10.0-196.el7.x86_64 root=/dev/mapper/rhel_unused-root ro crashkernel=auto rd.lvm.lv=rhel_unused/root rd.lvm.lv=rhel_unused/swap console=tty0 console=ttyS0,115200 LANG=en_US.UTF-8 systemd.debug >Oct 29 11:32:34 unused kernel: PID hash table entries: 4096 (order: 3, 32768 bytes) >Oct 29 11:32:34 unused kernel: xsave: enabled xstate_bv 0x7, cntxt size 0x340 >Oct 29 11:32:34 unused kernel: Checking aperture... >Oct 29 11:32:34 unused kernel: No AGP bridge found >Oct 29 11:32:34 unused kernel: Memory: 3863488k/5242880k available (6240k kernel code, 1049096k absent, 330296k reserved, 4181k data, 1604k init) >Oct 29 11:32:34 unused kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 >Oct 29 11:32:34 unused kernel: Hierarchical RCU implementation. >Oct 29 11:32:34 unused kernel: RCU restricting CPUs from NR_CPUS=5120 to nr_cpu_ids=4. >Oct 29 11:32:34 unused kernel: Experimental no-CBs for all CPUs >Oct 29 11:32:34 unused kernel: Experimental no-CBs CPUs: 0-3. >Oct 29 11:32:34 unused kernel: NR_IRQS:327936 nr_irqs:712 16 >Oct 29 11:32:34 unused kernel: Console: colour VGA+ 80x25 >Oct 29 11:32:34 unused kernel: console [tty0] enabled >Oct 29 11:32:34 unused kernel: console [ttyS0] enabled >Oct 29 11:32:34 unused kernel: allocated 16777216 bytes of page_cgroup >Oct 29 11:32:34 unused kernel: please try 'cgroup_disable=memory' option if you don't want memory cgroups >Oct 29 11:32:34 unused kernel: tsc: Detected 1999.999 MHz processor >Oct 29 11:32:34 unused kernel: Calibrating delay loop (skipped) preset value.. 3999.99 BogoMIPS (lpj=1999999) >Oct 29 11:32:34 unused kernel: pid_max: default: 32768 minimum: 301 >Oct 29 11:32:34 unused kernel: Security Framework initialized >Oct 29 11:32:34 unused kernel: SELinux: Initializing. >Oct 29 11:32:34 unused kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes) >Oct 29 11:32:34 unused kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes) >Oct 29 11:32:34 unused kernel: Mount-cache hash table entries: 4096 >Oct 29 11:32:34 unused kernel: Initializing cgroup subsys memory >Oct 29 11:32:34 unused kernel: Initializing cgroup subsys devices >Oct 29 11:32:34 unused kernel: Initializing cgroup subsys freezer >Oct 29 11:32:34 unused kernel: Initializing cgroup subsys net_cls >Oct 29 11:32:34 unused kernel: Initializing cgroup subsys blkio >Oct 29 11:32:34 unused kernel: Initializing cgroup subsys perf_event >Oct 29 11:32:34 unused kernel: Initializing cgroup subsys hugetlb >Oct 29 11:32:34 unused kernel: CPU: Physical Processor ID: 0 >Oct 29 11:32:34 unused kernel: CPU: Processor Core ID: 0 >Oct 29 11:32:34 unused kernel: mce: CPU supports 10 MCE banks >Oct 29 11:32:34 unused kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 >Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0 >tlb_flushall_shift: 6 >Oct 29 11:32:34 unused kernel: Freeing SMP alternatives: 24k freed >Oct 29 11:32:34 unused kernel: ACPI: Core revision 20130517 >Oct 29 11:32:34 unused kernel: ACPI: All ACPI Tables successfully acquired >Oct 29 11:32:34 unused kernel: ftrace: allocating 23897 entries in 94 pages >Oct 29 11:32:34 unused kernel: Enabling x2apic >Oct 29 11:32:34 unused kernel: Enabled x2apic >Oct 29 11:32:34 unused kernel: Switched APIC routing to physical x2apic. >Oct 29 11:32:34 unused kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 >Oct 29 11:32:34 unused kernel: smpboot: CPU0: Intel Xeon E312xx (Sandy Bridge) (fam: 06, model: 2a, stepping: 01) >Oct 29 11:32:34 unused kernel: Performance Events: unsupported p6 CPU model 42 no PMU driver, software events only. >Oct 29 11:32:34 unused kernel: KVM setup paravirtual spinlock >Oct 29 11:32:34 unused kernel: NMI watchdog: disabled (cpu0): hardware events not enabled >Oct 29 11:32:34 unused kernel: kvm-clock: cpu 1, msr 1:3ff86041, secondary cpu clock >Oct 29 11:32:34 unused kernel: KVM setup async PF for cpu 1 >Oct 29 11:32:34 unused kernel: kvm-stealtime: cpu 1, msr 13fc8e000 >Oct 29 11:32:34 unused kernel: kvm-clock: cpu 2, msr 1:3ff86081, secondary cpu clock >Oct 29 11:32:34 unused kernel: KVM setup async PF for cpu 2 >Oct 29 11:32:34 unused kernel: smpboot: Booting Node 0, Processors #1 #2 #3 OK >Oct 29 11:32:34 unused kernel: kvm-stealtime: cpu 2, msr 13fd0e000 >Oct 29 11:32:34 unused kernel: kvm-clock: cpu 3, msr 1:3ff860c1, secondary cpu clock >Oct 29 11:32:34 unused kernel: Brought up 4 CPUs >Oct 29 11:32:34 unused kernel: KVM setup async PF for cpu 3 >Oct 29 11:32:34 unused kernel: kvm-stealtime: cpu 3, msr 13fd8e000 >Oct 29 11:32:34 unused kernel: smpboot: Total of 4 processors activated (15999.99 BogoMIPS) >Oct 29 11:32:34 unused kernel: devtmpfs: initialized >Oct 29 11:32:34 unused kernel: EVM: security.selinux >Oct 29 11:32:34 unused kernel: EVM: security.ima >Oct 29 11:32:34 unused kernel: EVM: security.capability >Oct 29 11:32:34 unused kernel: atomic64 test passed for x86-64 platform with CX8 and with SSE >Oct 29 11:32:34 unused kernel: NET: Registered protocol family 16 >Oct 29 11:32:34 unused kernel: ACPI: bus type PCI registered >Oct 29 11:32:34 unused kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 >Oct 29 11:32:34 unused kernel: PCI: Using configuration type 1 for base access >Oct 29 11:32:34 unused kernel: ACPI: Added _OSI(Module Device) >Oct 29 11:32:34 unused kernel: ACPI: Added _OSI(Processor Device) >Oct 29 11:32:34 unused kernel: ACPI: Added _OSI(3.0 _SCP Extensions) >Oct 29 11:32:34 unused kernel: ACPI: Added _OSI(Processor Aggregator Device) >Oct 29 11:32:34 unused kernel: ACPI: Interpreter enabled >Oct 29 11:32:34 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S1_] (20130517/hwxface-571) >Oct 29 11:32:34 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S2_] (20130517/hwxface-571) >Oct 29 11:32:34 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S3_] (20130517/hwxface-571) >Oct 29 11:32:34 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S4_] (20130517/hwxface-571) >Oct 29 11:32:34 unused kernel: ACPI: (supports S0 S5) >Oct 29 11:32:34 unused kernel: ACPI: Using IOAPIC for interrupt routing >Oct 29 11:32:34 unused kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug >Oct 29 11:32:34 unused kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) >Oct 29 11:32:34 unused kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI] >Oct 29 11:32:34 unused kernel: acpi PNP0A03:00: _OSC failed (AE_NOT_FOUND); disabling ASPM >Oct 29 11:32:34 unused kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. >Oct 29 11:32:34 unused kernel: acpiphp: Slot [4] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [5] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [6] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [7] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [8] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [9] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [10] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [11] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [12] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [13] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [14] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [15] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [16] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [17] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [18] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [19] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [20] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [21] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [22] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [23] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [24] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [25] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [26] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [27] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [28] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [29] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [30] registered >Oct 29 11:32:34 unused kernel: acpiphp: Slot [31] registered >Oct 29 11:32:34 unused kernel: PCI host bridge to bus 0000:00 >Oct 29 11:32:34 unused kernel: pci_bus 0000:00: root bus resource [bus 00-ff] >Oct 29 11:32:34 unused kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7] >Oct 29 11:32:34 unused kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xadff] >Oct 29 11:32:34 unused kernel: pci_bus 0000:00: root bus resource [io 0xae0f-0xaeff] >Oct 29 11:32:34 unused kernel: pci_bus 0000:00: root bus resource [io 0xaf20-0xafdf] >Oct 29 11:32:34 unused kernel: pci_bus 0000:00: root bus resource [io 0xafe4-0xffff] >Oct 29 11:32:34 unused kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff] >Oct 29 11:32:34 unused kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff] >Oct 29 11:32:34 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] >Oct 29 11:32:34 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] >Oct 29 11:32:34 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] >Oct 29 11:32:34 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] >Oct 29 11:32:34 unused kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI >Oct 29 11:32:34 unused kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB >Oct 29 11:32:34 unused kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) >Oct 29 11:32:34 unused kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) >Oct 29 11:32:34 unused kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) >Oct 29 11:32:34 unused kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) >Oct 29 11:32:34 unused kernel: ACPI: PCI Interrupt Link [LNKS] (IRQs *9) >Oct 29 11:32:34 unused kernel: ACPI: Enabled 16 GPEs in block 00 to 0F >Oct 29 11:32:34 unused kernel: vgaarb: device added: PCI:0000:00:02.0,decodes=io+mem,owns=io+mem,locks=none >Oct 29 11:32:34 unused kernel: vgaarb: loaded >Oct 29 11:32:34 unused kernel: vgaarb: bridge control possible 0000:00:02.0 >Oct 29 11:32:34 unused kernel: SCSI subsystem initialized >Oct 29 11:32:34 unused kernel: ACPI: bus type USB registered >Oct 29 11:32:34 unused kernel: usbcore: registered new interface driver usbfs >Oct 29 11:32:34 unused kernel: usbcore: registered new interface driver hub >Oct 29 11:32:34 unused kernel: usbcore: registered new device driver usb >Oct 29 11:32:34 unused kernel: PCI: Using ACPI for IRQ routing >Oct 29 11:32:34 unused kernel: NetLabel: Initializing >Oct 29 11:32:34 unused kernel: NetLabel: domain hash size = 128 >Oct 29 11:32:34 unused kernel: NetLabel: protocols = UNLABELED CIPSOv4 >Oct 29 11:32:34 unused kernel: NetLabel: unlabeled traffic allowed by default >Oct 29 11:32:34 unused kernel: Switching to clocksource kvm-clock >Oct 29 11:32:34 unused kernel: pnp: PnP ACPI init >Oct 29 11:32:34 unused kernel: ACPI: bus type PNP registered >Oct 29 11:32:34 unused kernel: pnp: PnP ACPI: found 5 devices >Oct 29 11:32:34 unused kernel: ACPI: bus type PNP unregistered >Oct 29 11:32:34 unused kernel: NET: Registered protocol family 2 >Oct 29 11:32:34 unused kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes) >Oct 29 11:32:34 unused kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes) >Oct 29 11:32:34 unused kernel: TCP: Hash tables configured (established 32768 bind 32768) >Oct 29 11:32:34 unused kernel: TCP: reno registered >Oct 29 11:32:34 unused kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes) >Oct 29 11:32:34 unused kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes) >Oct 29 11:32:34 unused kernel: NET: Registered protocol family 1 >Oct 29 11:32:34 unused kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers >Oct 29 11:32:34 unused kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release >Oct 29 11:32:34 unused kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds >Oct 29 11:32:34 unused kernel: ACPI: PCI Interrupt Link [LNKC] enabled at IRQ 11 >Oct 29 11:32:34 unused kernel: Unpacking initramfs... >Oct 29 11:32:34 unused kernel: Freeing initrd memory: 17796k freed >Oct 29 11:32:34 unused kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) >Oct 29 11:32:34 unused kernel: software IO TLB [mem 0xbbfe0000-0xbffe0000] (64MB) mapped at [ffff8800bbfe0000-ffff8800bffdffff] >Oct 29 11:32:34 unused kernel: microcode: CPU0 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:32:34 unused kernel: microcode: CPU1 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:32:34 unused kernel: microcode: CPU2 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:32:34 unused kernel: microcode: CPU3 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:32:34 unused kernel: microcode: Microcode Update Driver: v2.00 <tigran@aivazian.fsnet.co.uk>, Peter Oruba >Oct 29 11:32:34 unused kernel: futex hash table entries: 1024 (order: 4, 65536 bytes) >Oct 29 11:32:34 unused kernel: Initialise system trusted keyring >Oct 29 11:32:34 unused kernel: audit: initializing netlink socket (disabled) >Oct 29 11:32:34 unused kernel: type=2000 audit(1414553553.802:1): initialized >Oct 29 11:32:34 unused kernel: HugeTLB registered 2 MB page size, pre-allocated 0 pages >Oct 29 11:32:34 unused kernel: zbud: loaded >Oct 29 11:32:34 unused kernel: VFS: Disk quotas dquot_6.5.2 >Oct 29 11:32:34 unused kernel: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) >Oct 29 11:32:34 unused kernel: msgmni has been set to 7580 >Oct 29 11:32:34 unused kernel: Key type big_key registered >Oct 29 11:32:34 unused kernel: alg: No test for stdrng (krng) >Oct 29 11:32:34 unused kernel: NET: Registered protocol family 38 >Oct 29 11:32:34 unused kernel: Key type asymmetric registered >Oct 29 11:32:34 unused kernel: Asymmetric key parser 'x509' registered >Oct 29 11:32:34 unused kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 252) >Oct 29 11:32:34 unused kernel: io scheduler noop registered >Oct 29 11:32:34 unused kernel: io scheduler deadline registered (default) >Oct 29 11:32:34 unused kernel: io scheduler cfq registered >Oct 29 11:32:34 unused kernel: pci_hotplug: PCI Hot Plug PCI Core version: 0.5 >Oct 29 11:32:34 unused kernel: pciehp: PCI Express Hot Plug Controller Driver version: 0.4 >Oct 29 11:32:34 unused kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 >Oct 29 11:32:34 unused kernel: ACPI: Power Button [PWRF] >Oct 29 11:32:34 unused kernel: GHES: HEST is not enabled! >Oct 29 11:32:34 unused kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled >Oct 29 11:32:34 unused kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A >Oct 29 11:32:34 unused kernel: Non-volatile memory driver v1.3 >Oct 29 11:32:34 unused kernel: Linux agpgart interface v0.103 >Oct 29 11:32:34 unused kernel: crash memory driver: version 1.1 >Oct 29 11:32:34 unused kernel: rdac: device handler registered >Oct 29 11:32:34 unused kernel: hp_sw: device handler registered >Oct 29 11:32:34 unused kernel: emc: device handler registered >Oct 29 11:32:34 unused kernel: alua: device handler registered >Oct 29 11:32:34 unused kernel: libphy: Fixed MDIO Bus: probed >Oct 29 11:32:34 unused kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver >Oct 29 11:32:34 unused kernel: ehci-pci: EHCI PCI platform driver >Oct 29 11:32:34 unused kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver >Oct 29 11:32:34 unused kernel: ohci-pci: OHCI PCI platform driver >Oct 29 11:32:34 unused kernel: uhci_hcd: USB Universal Host Controller Interface driver >Oct 29 11:32:34 unused kernel: uhci_hcd 0000:00:03.0: UHCI Host Controller >Oct 29 11:32:34 unused kernel: uhci_hcd 0000:00:03.0: new USB bus registered, assigned bus number 1 >Oct 29 11:32:34 unused kernel: uhci_hcd 0000:00:03.0: detected 2 ports >Oct 29 11:32:34 unused kernel: uhci_hcd 0000:00:03.0: irq 11, io base 0x0000c0a0 >Oct 29 11:32:34 unused kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001 >Oct 29 11:32:34 unused kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Oct 29 11:32:34 unused kernel: usb usb1: Product: UHCI Host Controller >Oct 29 11:32:34 unused kernel: usb usb1: Manufacturer: Linux 3.10.0-196.el7.x86_64 uhci_hcd >Oct 29 11:32:34 unused kernel: usb usb1: SerialNumber: 0000:00:03.0 >Oct 29 11:32:34 unused kernel: hub 1-0:1.0: USB hub found >Oct 29 11:32:34 unused kernel: hub 1-0:1.0: 2 ports detected >Oct 29 11:32:34 unused kernel: usbcore: registered new interface driver usbserial >Oct 29 11:32:34 unused kernel: usbcore: registered new interface driver usbserial_generic >Oct 29 11:32:34 unused kernel: usbserial: USB Serial support registered for generic >Oct 29 11:32:34 unused kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 >Oct 29 11:32:34 unused kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 >Oct 29 11:32:34 unused kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 >Oct 29 11:32:34 unused kernel: mousedev: PS/2 mouse device common for all mice >Oct 29 11:32:34 unused kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 >Oct 29 11:32:34 unused kernel: rtc_cmos 00:00: RTC can wake from S4 >Oct 29 11:32:34 unused kernel: rtc_cmos 00:00: rtc core: registered rtc_cmos as rtc0 >Oct 29 11:32:34 unused kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram >Oct 29 11:32:34 unused kernel: cpuidle: using governor menu >Oct 29 11:32:34 unused kernel: hidraw: raw HID events driver (C) Jiri Kosina >Oct 29 11:32:34 unused kernel: usbcore: registered new interface driver usbhid >Oct 29 11:32:34 unused kernel: usbhid: USB HID core driver >Oct 29 11:32:34 unused kernel: drop_monitor: Initializing network drop monitor service >Oct 29 11:32:34 unused kernel: TCP: cubic registered >Oct 29 11:32:34 unused kernel: Initializing XFRM netlink socket >Oct 29 11:32:34 unused kernel: NET: Registered protocol family 10 >Oct 29 11:32:34 unused kernel: NET: Registered protocol family 17 >Oct 29 11:32:34 unused kernel: Loading compiled-in X.509 certificates >Oct 29 11:32:34 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' >Oct 29 11:32:34 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' >Oct 29 11:32:34 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: 8c65d2217a39e9fa0bc841f8ba391e662cf68bcc' >Oct 29 11:32:34 unused kernel: registered taskstats version 1 >Oct 29 11:32:34 unused kernel: Key type trusted registered >Oct 29 11:32:34 unused kernel: Key type encrypted registered >Oct 29 11:32:34 unused kernel: IMA: No TPM chip found, activating TPM-bypass! >Oct 29 11:32:34 unused kernel: rtc_cmos 00:00: setting system clock to 2014-10-29 03:32:34 UTC (1414553554) >Oct 29 11:32:34 unused kernel: Freeing unused kernel memory: 1604k freed >Oct 29 11:32:34 unused systemd[1]: Unknown kernel switch systemd.debug. Ignoring. >Oct 29 11:32:34 unused systemd[1]: Supported kernel switches: >Oct 29 11:32:34 unused systemd[1]: systemd.unit=UNIT Default unit to start >Oct 29 11:32:34 unused systemd[1]: rd.systemd.unit=UNIT Default unit to start when run in initrd >Oct 29 11:32:34 unused systemd[1]: systemd.dump_core=0|1 Dump core on crash >Oct 29 11:32:34 unused systemd[1]: systemd.crash_shell=0|1 Run shell on crash >Oct 29 11:32:34 unused systemd[1]: systemd.crash_chvt=N Change to VT #N on crash >Oct 29 11:32:34 unused systemd[1]: systemd.confirm_spawn=0|1 Confirm every process spawn >Oct 29 11:32:34 unused systemd[1]: systemd.show_status=0|1 Show status updates on the console during bootup >Oct 29 11:32:34 unused systemd[1]: systemd.log_target=console|kmsg|journal|journal-or-kmsg|syslog|syslog-or-kmsg|null >Oct 29 11:32:34 unused systemd[1]: Log target >Oct 29 11:32:34 unused systemd[1]: systemd.log_level=LEVEL Log level >Oct 29 11:32:34 unused systemd[1]: systemd.log_color=0|1 Highlight important log messages >Oct 29 11:32:34 unused systemd[1]: systemd.log_location=0|1 Include code location in log messages >Oct 29 11:32:34 unused systemd[1]: systemd.default_standard_output=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 11:32:34 unused systemd[1]: Set default log output for services >Oct 29 11:32:34 unused systemd[1]: systemd.default_standard_error=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 11:32:34 unused systemd[1]: Set default log error output for services >Oct 29 11:32:34 unused systemd[1]: systemd.setenv=ASSIGNMENT Set an environment variable for all spawned processes >Oct 29 11:32:34 unused systemd[1]: systemd 208 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ) >Oct 29 11:32:34 unused systemd[1]: Detected virtualization 'kvm'. >Oct 29 11:32:34 unused systemd[1]: Running in initial RAM disk. >Oct 29 11:32:34 unused systemd[1]: Set hostname to <unused>. >Oct 29 11:32:34 unused systemd[1]: Expecting device dev-mapper-rhel_unused\x2droot.device... >Oct 29 11:32:34 unused systemd[1]: Starting -.slice. >Oct 29 11:32:34 unused systemd[1]: Created slice -.slice. >Oct 29 11:32:34 unused systemd[1]: Starting System Slice. >Oct 29 11:32:34 unused systemd[1]: Created slice System Slice. >Oct 29 11:32:34 unused systemd[1]: Starting Slices. >Oct 29 11:32:34 unused systemd[1]: Reached target Slices. >Oct 29 11:32:34 unused systemd[1]: Starting Timers. >Oct 29 11:32:34 unused systemd[1]: Reached target Timers. >Oct 29 11:32:34 unused systemd[1]: Starting Journal Socket. >Oct 29 11:32:34 unused systemd[1]: Listening on Journal Socket. >Oct 29 11:32:34 unused systemd[1]: Started dracut ask for additional cmdline parameters. >Oct 29 11:32:34 unused systemd[1]: Starting dracut cmdline hook... >Oct 29 11:32:34 unused systemd[1]: Started Load Kernel Modules. >Oct 29 11:32:34 unused systemd[1]: Starting Setup Virtual Console... >Oct 29 11:32:34 unused systemd[1]: Starting Journal Service... >Oct 29 11:32:34 unused systemd[1]: Started Journal Service. >Oct 29 11:32:34 unused journal: Journal started >Oct 29 11:32:34 unused systemd: Starting udev Kernel Socket. >Oct 29 11:32:34 unused systemd: Listening on udev Kernel Socket. >Oct 29 11:32:34 unused systemd: Starting udev Control Socket. >Oct 29 11:32:34 unused dracut-cmdline: dracut-7.1 (Maipo) dracut-033-224.el7 >Oct 29 11:32:34 unused dracut-cmdline: Using kernel command line parameters: >Oct 29 11:32:34 unused systemd: Listening on udev Control Socket. >Oct 29 11:32:34 unused systemd: Starting Sockets. >Oct 29 11:32:34 unused systemd: Reached target Sockets. >Oct 29 11:32:34 unused systemd: Starting Create list of required static device nodes for the current kernel... >Oct 29 11:32:34 unused systemd: Starting Apply Kernel Variables... >Oct 29 11:32:34 unused systemd: Starting Swap. >Oct 29 11:32:34 unused systemd: Reached target Swap. >Oct 29 11:32:34 unused systemd: Starting Local File Systems. >Oct 29 11:32:34 unused systemd: Reached target Local File Systems. >Oct 29 11:32:34 unused systemd: Started Apply Kernel Variables. >Oct 29 11:32:34 unused systemd: Started Create list of required static device nodes for the current kernel. >Oct 29 11:32:34 unused systemd: Starting Create static device nodes in /dev... >Oct 29 11:32:34 unused systemd: Started Create static device nodes in /dev. >Oct 29 11:32:34 unused systemd: Started Setup Virtual Console. >Oct 29 11:32:34 unused systemd: Started dracut cmdline hook. >Oct 29 11:32:34 unused systemd: Starting dracut pre-udev hook... >Oct 29 11:32:34 unused kernel: device-mapper: uevent: version 1.0.3 >Oct 29 11:32:34 unused kernel: device-mapper: ioctl: 4.27.0-ioctl (2013-10-30) initialised: dm-devel@redhat.com >Oct 29 11:32:34 unused kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd >Oct 29 11:32:34 unused systemd: Started dracut pre-udev hook. >Oct 29 11:32:34 unused systemd: Starting udev Kernel Device Manager... >Oct 29 11:32:34 unused systemd-udevd[260]: starting version 208 >Oct 29 11:32:34 unused systemd: Started udev Kernel Device Manager. >Oct 29 11:32:34 unused systemd: Started dracut pre-trigger hook. >Oct 29 11:32:34 unused systemd: Starting udev Coldplug all Devices... >Oct 29 11:32:34 unused systemd: Mounting Configuration File System... >Oct 29 11:32:34 unused systemd: Mounted Configuration File System. >Oct 29 11:32:34 unused kernel: e1000: Intel(R) PRO/1000 Network Driver - version 7.3.21-k8-NAPI >Oct 29 11:32:34 unused kernel: e1000: Copyright (c) 1999-2006 Intel Corporation. >Oct 29 11:32:34 unused kernel: [drm] Initialized drm 1.1.0 20060810 >Oct 29 11:32:34 unused kernel: FDC 0 is a S82078B >Oct 29 11:32:34 unused systemd: Started udev Coldplug all Devices. >Oct 29 11:32:34 unused systemd: Starting dracut initqueue hook... >Oct 29 11:32:34 unused systemd: Starting System Initialization. >Oct 29 11:32:34 unused systemd: Reached target System Initialization. >Oct 29 11:32:34 unused systemd: Starting Show Plymouth Boot Screen... >Oct 29 11:32:34 unused systemd: Started Show Plymouth Boot Screen. >Oct 29 11:32:34 unused systemd: Started Dispatch Password Requests to Console Directory Watch. >Oct 29 11:32:34 unused systemd: Starting Paths. >Oct 29 11:32:34 unused systemd: Reached target Paths. >Oct 29 11:32:34 unused systemd: Starting Forward Password Requests to Plymouth Directory Watch. >Oct 29 11:32:34 unused systemd: Started Forward Password Requests to Plymouth Directory Watch. >Oct 29 11:32:34 unused systemd: Starting Basic System. >Oct 29 11:32:34 unused systemd: Reached target Basic System. >Oct 29 11:32:34 unused kernel: ACPI: PCI Interrupt Link [LNKD] enabled at IRQ 10 >Oct 29 11:32:34 unused kernel: scsi host0: Virtio SCSI HBA >Oct 29 11:32:34 unused kernel: scsi 0:0:0:0: Direct-Access QEMU QEMU HARDDISK 2.1. PQ: 0 ANSI: 5 >Oct 29 11:32:34 unused kernel: scsi 0:0:1:0: CD-ROM QEMU QEMU CD-ROM 2.1. PQ: 0 ANSI: 5 >Oct 29 11:32:34 unused kernel: ACPI: PCI Interrupt Link [LNKA] enabled at IRQ 10 >Oct 29 11:32:34 unused kernel: sr 0:0:1:0: [sr0] scsi3-mmc drive: 16x/50x cd/rw xa/form2 cdda tray >Oct 29 11:32:34 unused kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 >Oct 29 11:32:34 unused kernel: sd 0:0:0:0: [sda] 41943040 512-byte logical blocks: (21.4 GB/20.0 GiB) >Oct 29 11:32:34 unused kernel: sd 0:0:0:0: [sda] Write Protect is off >Oct 29 11:32:34 unused kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA >Oct 29 11:32:34 unused kernel: sda: sda1 sda2 >Oct 29 11:32:34 unused kernel: sd 0:0:0:0: [sda] Attached SCSI disk >Oct 29 11:32:34 unused kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001 >Oct 29 11:32:34 unused kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=5 >Oct 29 11:32:34 unused kernel: usb 1-1: Product: QEMU USB Tablet >Oct 29 11:32:34 unused kernel: usb 1-1: Manufacturer: QEMU >Oct 29 11:32:34 unused kernel: usb 1-1: SerialNumber: 42 >Oct 29 11:32:34 unused kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:03.0/usb1/1-1/1-1:1.0/input/input2 >Oct 29 11:32:34 unused kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Pointer [QEMU QEMU USB Tablet] on usb-0000:00:03.0-1/input0 >Oct 29 11:32:35 unused kernel: e1000 0000:00:05.0 eth0: (PCI:33MHz:32-bit) 9a:4e:4f:50:51:52 >Oct 29 11:32:35 unused kernel: e1000 0000:00:05.0 eth0: Intel(R) PRO/1000 Network Connection >Oct 29 11:32:35 unused kernel: scsi host1: ata_piix >Oct 29 11:32:35 unused kernel: scsi host2: ata_piix >Oct 29 11:32:35 unused kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 >Oct 29 11:32:35 unused kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 >Oct 29 11:32:35 unused systemd-udevd[262]: renamed network interface eth0 to ens5 >Oct 29 11:32:35 unused kernel: ACPI: PCI Interrupt Link [LNKB] enabled at IRQ 11 >Oct 29 11:32:35 unused kernel: [drm] Device Version 0.0 >Oct 29 11:32:35 unused kernel: [drm] Compression level 0 log level 0 >Oct 29 11:32:35 unused kernel: [drm] Currently using mode #0, list at 0x488 >Oct 29 11:32:35 unused kernel: [drm] 12286 io pages at offset 0x1000000 >Oct 29 11:32:35 unused kernel: [drm] 16777216 byte draw area at offset 0x0 >Oct 29 11:32:35 unused kernel: [drm] RAM header offset: 0x3ffe000 >Oct 29 11:32:35 unused kernel: [drm] rom modes offset 0x488 for 128 modes >Oct 29 11:32:35 unused kernel: [TTM] Zone kernel: Available graphics memory: 1941456 kiB >Oct 29 11:32:35 unused kernel: [TTM] Initializing pool allocator >Oct 29 11:32:35 unused kernel: [TTM] Initializing DMA pool allocator >Oct 29 11:32:35 unused kernel: [drm] qxl: 16M of VRAM memory size >Oct 29 11:32:35 unused kernel: [drm] qxl: 63M of IO pages memory ready (VRAM domain) >Oct 29 11:32:35 unused kernel: [drm] qxl: 32M of Surface memory size >Oct 29 11:32:35 unused kernel: [drm] main mem slot 1 [f8000000,3ffe000] >Oct 29 11:32:35 unused kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 >Oct 29 11:32:35 unused kernel: [drm] surface mem slot 2 [fc000000,2000000] >Oct 29 11:32:35 unused kernel: [drm] fb mappable at 0xF8000000, size 3145728 >Oct 29 11:32:35 unused kernel: [drm] fb: depth 24, pitch 4096, width 1024, height 768 >Oct 29 11:32:35 unused kernel: fbcon: qxldrmfb (fb0) is primary device >Oct 29 11:32:35 unused kernel: tsc: Refined TSC clocksource calibration: 2000.002 MHz >Oct 29 11:32:35 unused kernel: Console: switching to colour frame buffer device 128x48 >Oct 29 11:32:35 unused kernel: qxl 0000:00:02.0: fb0: qxldrmfb frame buffer device >Oct 29 11:32:35 unused kernel: qxl 0000:00:02.0: registered panic notifier >Oct 29 11:32:35 unused kernel: [drm] Initialized qxl 0.1.0 20120117 for 0000:00:02.0 on minor 0 >Oct 29 11:32:35 unused dracut-initqueue: Scanning devices sda2 for LVM logical volumes rhel_unused/root rhel_unused/swap >Oct 29 11:32:35 unused dracut-initqueue: inactive '/dev/rhel_unused/swap' [2.00 GiB] inherit >Oct 29 11:32:35 unused dracut-initqueue: inactive '/dev/rhel_unused/root' [17.47 GiB] inherit >Oct 29 11:32:35 unused systemd: Found device /dev/mapper/rhel_unused-root. >Oct 29 11:32:35 unused systemd: Starting File System Check on /dev/mapper/rhel_unused-root... >Oct 29 11:32:35 unused systemd-fsck: /sbin/fsck.xfs: XFS file system. >Oct 29 11:32:35 unused systemd: Started File System Check on /dev/mapper/rhel_unused-root. >Oct 29 11:32:35 unused systemd: Started dracut initqueue hook. >Oct 29 11:32:35 unused systemd: Started dracut pre-mount hook. >Oct 29 11:32:35 unused systemd: Mounting /sysroot... >Oct 29 11:32:35 unused systemd: Starting Remote File Systems (Pre). >Oct 29 11:32:35 unused systemd: Reached target Remote File Systems (Pre). >Oct 29 11:32:35 unused systemd: Starting Remote File Systems. >Oct 29 11:32:35 unused systemd: Reached target Remote File Systems. >Oct 29 11:32:35 unused kernel: SGI XFS with ACLs, security attributes, large block/inode numbers, no debug enabled >Oct 29 11:32:35 unused kernel: XFS (dm-0): Mounting V4 Filesystem >Oct 29 11:32:35 unused kernel: XFS (dm-0): Ending clean mount >Oct 29 11:32:35 unused systemd: Mounted /sysroot. >Oct 29 11:32:35 unused systemd: Starting Initrd Root File System. >Oct 29 11:32:35 unused systemd: Reached target Initrd Root File System. >Oct 29 11:32:35 unused systemd: Starting Reload Configuration from the Real Root... >Oct 29 11:32:35 unused systemd: Reloading. >Oct 29 11:32:35 unused systemd: Started Reload Configuration from the Real Root. >Oct 29 11:32:35 unused systemd: Starting Initrd File Systems. >Oct 29 11:32:35 unused systemd: Reached target Initrd File Systems. >Oct 29 11:32:35 unused systemd: Started dracut mount hook. >Oct 29 11:32:35 unused systemd: Starting Initrd Default Target. >Oct 29 11:32:35 unused systemd: Reached target Initrd Default Target. >Oct 29 11:32:35 unused systemd: Starting dracut pre-pivot and cleanup hook... >Oct 29 11:32:35 unused systemd: Started dracut pre-pivot and cleanup hook. >Oct 29 11:32:35 unused systemd: Starting Cleaning Up and Shutting Down Daemons... >Oct 29 11:32:35 unused systemd: Stopping Cleaning Up and Shutting Down Daemons... >Oct 29 11:32:35 unused systemd: Starting Plymouth switch root service... >Oct 29 11:32:35 unused systemd: Stopped Cleaning Up and Shutting Down Daemons. >Oct 29 11:32:35 unused systemd: Stopping dracut pre-pivot and cleanup hook... >Oct 29 11:32:35 unused systemd: Stopped dracut pre-pivot and cleanup hook. >Oct 29 11:32:35 unused systemd: Stopping Remote File Systems. >Oct 29 11:32:35 unused systemd: Stopped target Remote File Systems. >Oct 29 11:32:35 unused systemd: Stopping Remote File Systems (Pre). >Oct 29 11:32:35 unused systemd: Stopped target Remote File Systems (Pre). >Oct 29 11:32:35 unused systemd: Stopping dracut initqueue hook... >Oct 29 11:32:35 unused systemd: Stopped dracut initqueue hook. >Oct 29 11:32:35 unused systemd: Stopping Initrd Default Target. >Oct 29 11:32:35 unused systemd: Stopped target Initrd Default Target. >Oct 29 11:32:35 unused systemd: Stopping Basic System. >Oct 29 11:32:35 unused systemd: Stopped target Basic System. >Oct 29 11:32:35 unused systemd: Stopping Slices. >Oct 29 11:32:35 unused systemd: Stopped target Slices. >Oct 29 11:32:35 unused systemd: Stopping Paths. >Oct 29 11:32:35 unused systemd: Stopped target Paths. >Oct 29 11:32:35 unused systemd: Stopping Timers. >Oct 29 11:32:35 unused systemd: Stopped target Timers. >Oct 29 11:32:35 unused systemd: Stopping Sockets. >Oct 29 11:32:35 unused systemd: Stopped target Sockets. >Oct 29 11:32:35 unused systemd: Stopping System Initialization. >Oct 29 11:32:35 unused systemd: Stopped target System Initialization. >Oct 29 11:32:35 unused systemd: Stopping Apply Kernel Variables... >Oct 29 11:32:35 unused systemd: Stopped Apply Kernel Variables. >Oct 29 11:32:35 unused systemd: Stopping udev Coldplug all Devices... >Oct 29 11:32:35 unused systemd: Stopped udev Coldplug all Devices. >Oct 29 11:32:35 unused systemd: Stopping Swap. >Oct 29 11:32:35 unused systemd: Stopped target Swap. >Oct 29 11:32:35 unused systemd: Stopping Local File Systems. >Oct 29 11:32:35 unused systemd: Stopped target Local File Systems. >Oct 29 11:32:35 unused systemd: Stopping udev Kernel Device Manager... >Oct 29 11:32:35 unused systemd: Stopped udev Kernel Device Manager. >Oct 29 11:32:35 unused systemd: Stopping dracut pre-udev hook... >Oct 29 11:32:35 unused systemd: Stopped dracut pre-udev hook. >Oct 29 11:32:35 unused systemd: Stopping dracut cmdline hook... >Oct 29 11:32:35 unused systemd: Stopped dracut cmdline hook. >Oct 29 11:32:35 unused systemd: Stopping Create static device nodes in /dev... >Oct 29 11:32:35 unused systemd: Stopped Create static device nodes in /dev. >Oct 29 11:32:35 unused systemd: Stopping Create list of required static device nodes for the current kernel... >Oct 29 11:32:35 unused systemd: Stopped Create list of required static device nodes for the current kernel. >Oct 29 11:32:35 unused systemd: Stopping udev Kernel Socket. >Oct 29 11:32:35 unused systemd: Closed udev Kernel Socket. >Oct 29 11:32:35 unused systemd: Stopping udev Control Socket. >Oct 29 11:32:35 unused systemd: Closed udev Control Socket. >Oct 29 11:32:35 unused systemd: Starting Cleanup udevd DB... >Oct 29 11:32:35 unused systemd: Started Cleanup udevd DB. >Oct 29 11:32:35 unused systemd: Starting Switch Root. >Oct 29 11:32:35 unused systemd: Reached target Switch Root. >Oct 29 11:32:36 unused systemd: Started Plymouth switch root service. >Oct 29 11:32:36 unused systemd: Starting Switch Root... >Oct 29 11:32:36 unused systemd: Switching root. >Oct 29 11:32:36 unused journal: Journal stopped >Oct 29 11:32:41 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:32:41 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:32:41 unused systemd-journald[110]: Received SIGTERM >Oct 29 11:32:41 unused systemd-cgroups-agent[466]: Failed to get D-Bus connection: Unknown error -1 >Oct 29 11:32:41 unused kernel: type=1404 audit(1414553556.564:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 >Oct 29 11:32:41 unused kernel: type=1403 audit(1414553556.804:3): policy loaded auid=4294967295 ses=4294967295 >Oct 29 11:32:41 unused systemd[1]: Successfully loaded SELinux policy in 277.297ms. >Oct 29 11:32:41 unused systemd[1]: Relabelled /dev and /run in 20.729ms. >Oct 29 11:32:41 unused systemd[1]: Unknown kernel switch systemd.debug. Ignoring. >Oct 29 11:32:41 unused systemd[1]: Supported kernel switches: >Oct 29 11:32:41 unused systemd[1]: systemd.unit=UNIT Default unit to start >Oct 29 11:32:41 unused systemd[1]: rd.systemd.unit=UNIT Default unit to start when run in initrd >Oct 29 11:32:41 unused systemd[1]: systemd.dump_core=0|1 Dump core on crash >Oct 29 11:32:41 unused systemd[1]: systemd.crash_shell=0|1 Run shell on crash >Oct 29 11:32:41 unused systemd[1]: systemd.crash_chvt=N Change to VT #N on crash >Oct 29 11:32:41 unused systemd[1]: systemd.confirm_spawn=0|1 Confirm every process spawn >Oct 29 11:32:41 unused systemd[1]: systemd.show_status=0|1 Show status updates on the console during bootup >Oct 29 11:32:41 unused systemd[1]: systemd.log_target=console|kmsg|journal|journal-or-kmsg|syslog|syslog-or-kmsg|null >Oct 29 11:32:41 unused systemd[1]: Log target >Oct 29 11:32:41 unused systemd[1]: systemd.log_level=LEVEL Log level >Oct 29 11:32:41 unused systemd[1]: systemd.log_color=0|1 Highlight important log messages >Oct 29 11:32:41 unused systemd[1]: systemd.log_location=0|1 Include code location in log messages >Oct 29 11:32:41 unused systemd[1]: systemd.default_standard_output=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 11:32:41 unused systemd[1]: Set default log output for services >Oct 29 11:32:41 unused systemd[1]: systemd.default_standard_error=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 11:32:41 unused systemd[1]: Set default log error output for services >Oct 29 11:32:41 unused systemd[1]: systemd.setenv=ASSIGNMENT Set an environment variable for all spawned processes >Oct 29 11:32:41 unused journal: Journal started >Oct 29 11:32:41 unused systemd: systemd 208 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ) >Oct 29 11:32:41 unused systemd: Detected virtualization 'kvm'. >Oct 29 11:32:41 unused systemd: Set hostname to <unused>. >Oct 29 11:32:41 unused systemd: /usr/lib/systemd/system-generators/anaconda-generator exited with exit status 1. >Oct 29 11:32:41 unused systemd: [/usr/lib/systemd/system/lvm2-lvmetad.socket:9] Unknown lvalue 'RemoveOnStop' in section 'Socket' >Oct 29 11:32:41 unused systemd: [/usr/lib/systemd/system/dm-event.socket:10] Unknown lvalue 'RemoveOnStop' in section 'Socket' >Oct 29 11:32:41 unused systemd: Starting LVM2 metadata daemon... >Oct 29 11:32:41 unused systemd: Started LVM2 metadata daemon. >Oct 29 11:32:41 unused systemd: Started udev Coldplug all Devices. >Oct 29 11:32:41 unused systemd: Started Create static device nodes in /dev. >Oct 29 11:32:41 unused systemd: Started Import network configuration from initramfs. >Oct 29 11:32:41 unused systemd: Started Configure read-only root support. >Oct 29 11:32:41 unused systemd: Started Load/Save Random Seed. >Oct 29 11:32:41 unused systemd: Starting udev Kernel Device Manager... >Oct 29 11:32:41 unused systemd: Starting Local File Systems (Pre). >Oct 29 11:32:41 unused systemd: Reached target Local File Systems (Pre). >Oct 29 11:32:41 unused systemd: Starting udev Wait for Complete Device Initialization... >Oct 29 11:32:42 unused systemd-udevd[531]: starting version 208 >Oct 29 11:32:42 unused lvm: 2 logical volume(s) in volume group "rhel_unused" monitored >Oct 29 11:32:42 unused systemd: Started udev Kernel Device Manager. >Oct 29 11:32:42 unused systemd: Started Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. >Oct 29 11:32:42 unused systemd: Started udev Wait for Complete Device Initialization. >Oct 29 11:32:42 unused systemd: Starting Activation of DM RAID sets... >Oct 29 11:32:42 unused systemd: Found device /dev/ttyS0. >Oct 29 11:32:42 unused kernel: input: PC Speaker as /devices/platform/pcspkr/input/input4 >Oct 29 11:32:42 unused kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 >Oct 29 11:32:43 unused kernel: ppdev: user-space parallel port driver >Oct 29 11:32:43 unused kernel: alg: No test for __gcm-aes-aesni (__driver-gcm-aes-aesni) >Oct 29 11:32:43 unused mtp-probe: checking bus 1, device 2: "/sys/devices/pci0000:00/0000:00:03.0/usb1/1-1" >Oct 29 11:32:43 unused mtp-probe: bus: 1, device: 2 was not an MTP device >Oct 29 11:32:43 unused systemd: Started Activation of DM RAID sets. >Oct 29 11:32:43 unused systemd: Starting Encrypted Volumes. >Oct 29 11:32:43 unused kernel: alg: No test for crc32 (crc32-pclmul) >Oct 29 11:32:43 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 29 11:32:43 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 29 11:32:43 unused systemd: Reached target Encrypted Volumes. >Oct 29 11:32:43 unused systemd: Found device /dev/mapper/rhel_unused-swap. >Oct 29 11:32:43 unused systemd: Activating swap /dev/mapper/rhel_unused-swap... >Oct 29 11:32:43 unused systemd: Starting LVM2 PV scan on device 8:2... >Oct 29 11:32:43 unused kernel: Adding 2097148k swap on /dev/mapper/rhel_unused-swap. Priority:-1 extents:1 across:2097148k FS >Oct 29 11:32:43 unused lvm: 2 logical volume(s) in volume group "rhel_unused" now active >Oct 29 11:32:44 unused systemd: Activated swap /dev/mapper/rhel_unused-swap. >Oct 29 11:32:44 unused systemd: Started LVM2 PV scan on device 8:2. >Oct 29 11:32:44 unused systemd: Starting Swap. >Oct 29 11:32:44 unused systemd: Reached target Swap. >Oct 29 11:32:44 unused systemd: Found device QEMU_HARDDISK. >Oct 29 11:32:44 unused systemd: Mounting /boot... >Oct 29 11:32:44 unused kernel: XFS (sda1): Mounting V4 Filesystem >Oct 29 11:32:50 unused kernel: XFS (sda1): Ending clean mount >Oct 29 11:32:50 unused systemd: Mounted /boot. >Oct 29 11:32:50 unused systemd: Starting Local File Systems. >Oct 29 11:32:50 unused systemd: Reached target Local File Systems. >Oct 29 11:32:50 unused systemd: Started Mark the need to relabel after reboot. >Oct 29 11:32:50 unused systemd: Started Relabel all filesystems, if necessary. >Oct 29 11:32:50 unused systemd: Started Reconfigure the system on administrator request. >Oct 29 11:32:50 unused systemd: Starting Create Volatile Files and Directories... >Oct 29 11:32:50 unused systemd: Starting Tell Plymouth To Write Out Runtime Data... >Oct 29 11:32:50 unused systemd: Started Create Volatile Files and Directories. >Oct 29 11:32:50 unused systemd: Starting Security Auditing Service... >Oct 29 11:32:50 unused augenrules: /sbin/augenrules: No change >Oct 29 11:32:50 unused auditd[618]: Started dispatcher: /sbin/audispd pid: 629 >Oct 29 11:32:51 unused kernel: type=1305 audit(1414553570.986:4): audit_pid=618 old=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 >Oct 29 11:32:51 unused audispd: audispd initialized with q_depth=150 and 1 active plugins >Oct 29 11:32:51 unused auditd[618]: Init complete, auditd 2.4 listening for events (startup state enable) >Oct 29 11:32:51 unused augenrules: No rules >Oct 29 11:32:51 unused augenrules: enabled 1 >Oct 29 11:32:51 unused augenrules: flag 1 >Oct 29 11:32:51 unused augenrules: pid 618 >Oct 29 11:32:51 unused augenrules: rate_limit 0 >Oct 29 11:32:51 unused augenrules: backlog_limit 320 >Oct 29 11:32:51 unused augenrules: lost 0 >Oct 29 11:32:51 unused augenrules: backlog 1 >Oct 29 11:32:51 unused systemd: Started Security Auditing Service. >Oct 29 11:32:51 unused systemd: Starting Update UTMP about System Reboot/Shutdown... >Oct 29 11:32:51 unused systemd: Started Update UTMP about System Reboot/Shutdown. >Oct 29 11:32:51 unused systemd: Started Tell Plymouth To Write Out Runtime Data. >Oct 29 11:32:51 unused systemd: Starting System Initialization. >Oct 29 11:32:51 unused systemd: Reached target System Initialization. >Oct 29 11:32:51 unused systemd: Starting Daily Cleanup of Temporary Directories. >Oct 29 11:32:51 unused systemd: Started Daily Cleanup of Temporary Directories. >Oct 29 11:32:51 unused systemd: Starting Timers. >Oct 29 11:32:51 unused systemd: Reached target Timers. >Oct 29 11:32:51 unused systemd: Starting Open-iSCSI iscsid Socket. >Oct 29 11:32:51 unused systemd: Listening on Open-iSCSI iscsid Socket. >Oct 29 11:32:51 unused systemd: Starting Open-iSCSI iscsiuio Socket. >Oct 29 11:32:51 unused systemd: Listening on Open-iSCSI iscsiuio Socket. >Oct 29 11:32:51 unused systemd: Starting RPCbind Server Activation Socket. >Oct 29 11:32:51 unused systemd: Listening on RPCbind Server Activation Socket. >Oct 29 11:32:51 unused systemd: Starting Avahi mDNS/DNS-SD Stack Activation Socket. >Oct 29 11:32:51 unused systemd: Listening on Avahi mDNS/DNS-SD Stack Activation Socket. >Oct 29 11:32:51 unused systemd: Starting Flexible branding. >Oct 29 11:32:51 unused systemd: Started Flexible branding. >Oct 29 11:32:51 unused systemd: Starting Paths. >Oct 29 11:32:51 unused systemd: Reached target Paths. >Oct 29 11:32:51 unused systemd: Starting D-Bus System Message Bus Socket. >Oct 29 11:32:51 unused systemd: Listening on D-Bus System Message Bus Socket. >Oct 29 11:32:51 unused systemd: Starting Sockets. >Oct 29 11:32:51 unused systemd: Reached target Sockets. >Oct 29 11:32:51 unused systemd: Starting Basic System. >Oct 29 11:32:51 unused systemd: Reached target Basic System. >Oct 29 11:32:51 unused systemd: Starting firewalld - dynamic firewall daemon... >Oct 29 11:32:51 unused systemd: Started Load CPU microcode update. >Oct 29 11:32:51 unused systemd: Starting Dump dmesg to /var/log/dmesg... >Oct 29 11:32:51 unused systemd: Started Software RAID monitoring and management. >Oct 29 11:32:51 unused systemd: Starting libstoragemgmt plug-in server daemon... >Oct 29 11:32:51 unused systemd: Started libstoragemgmt plug-in server daemon. >Oct 29 11:32:51 unused systemd: Starting Avahi mDNS/DNS-SD Stack... >Oct 29 11:32:51 unused systemd: Starting NTP client/server... >Oct 29 11:32:51 unused systemd: Starting Kernel Samepage Merging... >Oct 29 11:32:51 unused systemd: Starting Rollback uncommitted netcf network config change transactions... >Oct 29 11:32:51 unused systemd: Starting System Logging Service... >Oct 29 11:32:52 unused netcf-transaction.sh: Running start: No pending transaction to rollback >Oct 29 11:32:52 unused systemd: Starting Resets System Activity Logs... >Oct 29 11:32:52 unused systemd: Starting Self Monitoring and Reporting Technology (SMART) Daemon... >Oct 29 11:32:52 unused systemd: Started Self Monitoring and Reporting Technology (SMART) Daemon. >Oct 29 11:32:52 unused systemd: Starting Dynamic System Tuning Daemon... >Oct 29 11:32:52 unused avahi-daemon[649]: Found user 'avahi' (UID 70) and group 'avahi' (GID 70). >Oct 29 11:32:52 unused avahi-daemon[649]: Successfully dropped root privileges. >Oct 29 11:32:52 unused avahi-daemon[649]: avahi-daemon 0.6.31 starting up. >Oct 29 11:32:52 unused avahi-daemon[649]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns! >Oct 29 11:32:52 unused systemd: Starting Hardware RNG Entropy Gatherer Daemon... >Oct 29 11:32:52 unused systemd: Started Hardware RNG Entropy Gatherer Daemon. >Oct 29 11:32:52 unused rngd: Unable to open file: /dev/tpm0 >Oct 29 11:32:52 unused rngd: can't open any entropy source >Oct 29 11:32:52 unused rngd: Maybe RNG device modules are not loaded >Oct 29 11:32:52 unused systemd: Started OpenSSH Server Key Generation. >Oct 29 11:32:52 unused systemd: Starting irqbalance daemon... >Oct 29 11:32:52 unused systemd: Started irqbalance daemon. >Oct 29 11:32:52 unused systemd: Starting Login Service... >Oct 29 11:32:52 unused systemd: Starting Accounts Service... >Oct 29 11:32:52 unused systemd: Starting RealtimeKit Scheduling Policy Service... >Oct 29 11:32:52 unused chronyd[670]: chronyd version 1.29.1 starting >Oct 29 11:32:52 unused smartd[657]: smartd 6.2 2013-07-26 r3841 [x86_64-linux-3.10.0-196.el7.x86_64] (local build) >Oct 29 11:32:52 unused smartd[657]: Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org >Oct 29 11:32:52 unused smartd[657]: Opened configuration file /etc/smartmontools/smartd.conf >Oct 29 11:32:52 unused smartd[657]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices >Oct 29 11:32:52 unused smartd[657]: Device: /dev/sda, opened >Oct 29 11:32:52 unused smartd[657]: Device: /dev/sda, [QEMU QEMU HARDDISK 2.1.], 21.4 GB >Oct 29 11:32:52 unused chronyd[670]: Linux kernel major=3 minor=10 patch=0 >Oct 29 11:32:52 unused chronyd[670]: hz=100 shift_hz=7 freq_scale=1.00000000 nominal_tick=10000 slew_delta_tick=833 max_tick_bias=1000 shift_pll=2 >Oct 29 11:32:52 unused smartd[657]: Device: /dev/sda, Bad IEC (SMART) mode page, err=5, skip device >Oct 29 11:32:52 unused smartd[657]: Monitoring 0 ATA and 0 SCSI devices >Oct 29 11:32:52 unused chronyd[670]: Frequency 0.597 +/- 4.186 ppm read from /var/lib/chrony/drift >Oct 29 11:32:52 unused systemd: Starting D-Bus System Message Bus... >Oct 29 11:32:52 unused systemd: Started D-Bus System Message Bus. >Oct 29 11:32:52 unused systemd: Started Dump dmesg to /var/log/dmesg. >Oct 29 11:32:52 unused systemd: Started Kernel Samepage Merging. >Oct 29 11:32:52 unused systemd: Started Rollback uncommitted netcf network config change transactions. >Oct 29 11:32:53 unused systemd: Started Resets System Activity Logs. >Oct 29 11:32:53 unused systemd: rngd.service: main process exited, code=exited, status=1/FAILURE >Oct 29 11:32:53 unused systemd: Unit rngd.service entered failed state. >Oct 29 11:32:53 unused systemd: Starting Kernel Samepage Merging (KSM) Tuning Daemon... >Oct 29 11:32:53 unused systemd: Started System Logging Service. >Oct 29 11:32:53 unused systemd: Started Kernel Samepage Merging (KSM) Tuning Daemon. >Oct 29 11:32:53 unused systemd: Started NTP client/server. >Oct 29 11:32:54 unused dbus-daemon: dbus[677]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:32:54 unused dbus[677]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:32:54 unused systemd: Started Avahi mDNS/DNS-SD Stack. >Oct 29 11:32:54 unused avahi-daemon[649]: Successfully called chroot(). >Oct 29 11:32:54 unused avahi-daemon[649]: Successfully dropped remaining capabilities. >Oct 29 11:32:54 unused avahi-daemon[649]: No service file found in /etc/avahi/services. >Oct 29 11:32:54 unused systemd: Started RealtimeKit Scheduling Policy Service. >Oct 29 11:32:54 unused systemd-logind: New seat seat0. >Oct 29 11:32:54 unused avahi-daemon[649]: Network interface enumeration completed. >Oct 29 11:32:54 unused avahi-daemon[649]: Registering HINFO record with values 'X86_64'/'LINUX'. >Oct 29 11:32:54 unused avahi-daemon[649]: Server startup complete. Host name is unused.local. Local service cookie is 693834488. >Oct 29 11:32:54 unused systemd-logind: Watching system buttons on /dev/input/event0 (Power Button) >Oct 29 11:32:54 unused systemd: Started Login Service. >Oct 29 11:32:54 unused dbus-daemon: dbus[677]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Oct 29 11:32:54 unused dbus[677]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Oct 29 11:32:54 unused systemd: Starting Authorization Manager... >Oct 29 11:32:55 unused polkitd[710]: Started polkitd version 0.112 >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused kernel: ip_tables: (C) 2000-2006 Netfilter Core Team >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused dbus-daemon: dbus[677]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Oct 29 11:32:55 unused dbus[677]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Oct 29 11:32:55 unused systemd: Started Authorization Manager. >Oct 29 11:32:55 unused accounts-daemon[668]: started daemon version 0.6.35 >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused systemd: Started Accounts Service. >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:55 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused kernel: nf_conntrack version 0.5.0 (16384 buckets, 65536 max) >Oct 29 11:32:56 unused systemd: Started Dynamic System Tuning Daemon. >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:56 unused kernel: Ebtables v2.0 registered >Oct 29 11:32:56 unused kernel: Bridge firewalling registered >Oct 29 11:32:56 unused systemd: Started firewalld - dynamic firewall daemon. >Oct 29 11:32:56 unused systemd: Starting Network Manager... >Oct 29 11:32:56 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused NetworkManager[791]: <info> NetworkManager (version 0.9.9.1-42.git20140326.4dba720.el7) is starting... >Oct 29 11:32:57 unused NetworkManager[791]: <info> Read config: /etc/NetworkManager/NetworkManager.conf and conf.d: 10-ibft-plugin.conf, 00-server.conf >Oct 29 11:32:57 unused NetworkManager[791]: <info> WEXT support is disabled >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused kernel: cfg80211: Calling CRDA to update world regulatory domain >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused kernel: cfg80211: World regulatory domain updated: >Oct 29 11:32:57 unused kernel: cfg80211: DFS Master region: unset >Oct 29 11:32:57 unused kernel: cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time) >Oct 29 11:32:57 unused kernel: cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:32:57 unused kernel: cfg80211: (2457000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:32:57 unused kernel: cfg80211: (2474000 KHz - 2494000 KHz @ 20000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:32:57 unused kernel: cfg80211: (5170000 KHz - 5250000 KHz @ 160000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:32:57 unused kernel: cfg80211: (5250000 KHz - 5330000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s) >Oct 29 11:32:57 unused kernel: cfg80211: (5490000 KHz - 5730000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s) >Oct 29 11:32:57 unused kernel: cfg80211: (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:32:57 unused kernel: cfg80211: (57240000 KHz - 63720000 KHz @ 2160000 KHz), (N/A, 0 mBm), (N/A) >Oct 29 11:32:57 unused NetworkManager[791]: <info> VPN: loaded org.freedesktop.NetworkManager.libreswan >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused NetworkManager[791]: ifcfg-rh: Acquired D-Bus service com.redhat.ifcfgrh1 >Oct 29 11:32:57 unused NetworkManager[791]: <info> Loaded plugin ifcfg-rh: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused NetworkManager[791]: <info> Loaded plugin iBFT: (c) 2014 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 11:32:57 unused NetworkManager[791]: <info> Loaded plugin keyfile: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused NetworkManager[791]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:32:57 unused NetworkManager[791]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-ens5 ... >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused NetworkManager[791]: ifcfg-rh: read connection 'ens5' >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:57 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused NetworkManager[791]: <info> monitoring kernel firmware directory '/lib/firmware'. >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused NetworkManager[791]: <info> WiFi hardware radio set enabled >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused NetworkManager[791]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-adsl.so >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused NetworkManager[791]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-bluetooth.so >Oct 29 11:32:58 unused NetworkManager[791]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-wwan.so >Oct 29 11:32:58 unused NetworkManager[791]: <info> WiFi enabled by radio killswitch; enabled by state file >Oct 29 11:32:58 unused NetworkManager[791]: <info> WWAN enabled by radio killswitch; enabled by state file >Oct 29 11:32:58 unused NetworkManager[791]: <info> WiMAX enabled by radio killswitch; enabled by state file >Oct 29 11:32:58 unused NetworkManager[791]: <info> Networking is enabled by state file >Oct 29 11:32:58 unused NetworkManager[791]: <info> (lo): link connected >Oct 29 11:32:58 unused NetworkManager[791]: <info> (lo): carrier is ON (but ignored) >Oct 29 11:32:58 unused NetworkManager[791]: <info> (lo): new Generic device (driver: 'unknown' ifindex: 1) >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused NetworkManager[791]: <info> (lo): exported as /org/freedesktop/NetworkManager/Devices/0 >Oct 29 11:32:58 unused NetworkManager[791]: <info> (ens5): carrier is OFF (but ignored) >Oct 29 11:32:58 unused NetworkManager[791]: <info> (ens5): new Ethernet device (driver: 'e1000' ifindex: 2) >Oct 29 11:32:58 unused NetworkManager[791]: <info> (ens5): exported as /org/freedesktop/NetworkManager/Devices/1 >Oct 29 11:32:58 unused NetworkManager[791]: <info> (ens5): device state change: unmanaged -> unavailable (reason 'managed') [10 20 2] >Oct 29 11:32:58 unused NetworkManager[791]: <info> (ens5): preparing device >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused NetworkManager[791]: <info> (ens5): device state change: unavailable -> disconnected (reason 'none') [20 30 0] >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused systemd: Started Network Manager. >Oct 29 11:32:58 unused kernel: IPv6: ADDRCONF(NETDEV_UP): ens5: link is not ready >Oct 29 11:32:58 unused systemd: Starting LSB: Bring up/down networking... >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused NetworkManager[791]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:32:58 unused network: Bringing up loopback interface: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused dbus[677]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:32:58 unused dbus-daemon: dbus[677]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused NetworkManager[791]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:32:58 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused NetworkManager[791]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:32:58 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused NetworkManager[791]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:32:58 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused network: [ OK ] >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:58 unused NetworkManager[791]: <warn> Failed to activate 'ens5': Connection 'ens5' is not available on the device ens5 at this time. >Oct 29 11:32:58 unused NetworkManager[791]: <info> NetworkManager state is now DISCONNECTING >Oct 29 11:32:58 unused NetworkManager[791]: <info> NetworkManager state is now DISCONNECTED >Oct 29 11:32:58 unused network: Bringing up interface ens5: Error: Connection activation failed: Connection 'ens5' is not available on the device ens5 at this time. >Oct 29 11:32:58 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused network: [FAILED] >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused systemd: network.service: control process exited, code=exited status=1 >Oct 29 11:32:59 unused systemd: Failed to start LSB: Bring up/down networking. >Oct 29 11:32:59 unused systemd: Unit network.service entered failed state. >Oct 29 11:32:59 unused systemd: Starting Network. >Oct 29 11:32:59 unused systemd: Reached target Network. >Oct 29 11:32:59 unused systemd: Started Login and scanning of iSCSI devices. >Oct 29 11:32:59 unused systemd: Starting Remote File Systems (Pre). >Oct 29 11:32:59 unused systemd: Reached target Remote File Systems (Pre). >Oct 29 11:32:59 unused systemd: Starting Remote File Systems. >Oct 29 11:32:59 unused systemd: Reached target Remote File Systems. >Oct 29 11:32:59 unused systemd: Starting Trigger Flushing of Journal to Persistent Storage... >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused systemd: Starting Virtualization daemon... >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused systemd: Starting Enable periodic update of entitlement certificates.... >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused systemd: Starting Crash recovery kernel arming... >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused systemd: Starting Postfix Mail Transport Agent... >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused systemd: Starting OpenSSH server daemon... >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused systemd: Started OpenSSH server daemon. >Oct 29 11:32:59 unused systemd: Starting /etc/rc.d/rc.local Compatibility... >Oct 29 11:32:59 unused systemd: Starting LSB: Starts the Spacewalk Daemon... >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused systemd: Started Enable periodic update of entitlement certificates.. >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused systemd: PID file /var/run/rhnsd.pid not readable (yet?) after start. >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused systemd: Failed to start LSB: Starts the Spacewalk Daemon. >Oct 29 11:32:59 unused systemd: Unit rhnsd.service entered failed state. >Oct 29 11:32:59 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused systemd: Started Trigger Flushing of Journal to Persistent Storage. >Oct 29 11:32:59 unused systemd: Starting Permit User Sessions... >Oct 29 11:32:59 unused rc.local: ens5: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500 >Oct 29 11:32:59 unused rc.local: ether 9a:4e:4f:50:51:52 txqueuelen 1000 (Ethernet) >Oct 29 11:32:59 unused rc.local: RX packets 129 bytes 9598 (9.3 KiB) >Oct 29 11:32:59 unused rc.local: RX errors 0 dropped 0 overruns 0 frame 0 >Oct 29 11:32:59 unused rc.local: TX packets 0 bytes 0 (0.0 B) >Oct 29 11:32:59 unused rc.local: TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >Oct 29 11:32:59 unused rc.local: lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 >Oct 29 11:32:59 unused rc.local: inet 127.0.0.1 netmask 255.0.0.0 >Oct 29 11:32:59 unused rc.local: inet6 ::1 prefixlen 128 scopeid 0x10<host> >Oct 29 11:32:59 unused rc.local: loop txqueuelen 0 (Local Loopback) >Oct 29 11:32:59 unused rc.local: RX packets 12 bytes 1296 (1.2 KiB) >Oct 29 11:32:59 unused rc.local: RX errors 0 dropped 0 overruns 0 frame 0 >Oct 29 11:32:59 unused rc.local: TX packets 12 bytes 1296 (1.2 KiB) >Oct 29 11:32:59 unused rc.local: TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused systemd: Started /etc/rc.d/rc.local Compatibility. >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused systemd: Started Permit User Sessions. >Oct 29 11:32:59 unused systemd: Starting Command Scheduler... >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused libvirtd: 2014-10-29 03:32:59.747+0000: 1277: info : libvirt version: 1.2.8, package: 4.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2014-09-26-08:45:32, x86-021.build.eng.bos.redhat.com) >Oct 29 11:32:59 unused libvirtd: 2014-10-29 03:32:59.747+0000: 1277: warning : virGetHostname:665 : getaddrinfo failed for 'unused': Name or service not known >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused systemd: Started Command Scheduler. >Oct 29 11:32:59 unused systemd: Starting Job spooling tools... >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused systemd: Started Job spooling tools. >Oct 29 11:32:59 unused systemd: Starting GNOME Display Manager... >Oct 29 11:32:59 unused systemd: Starting Wait for Plymouth Boot Screen to Quit... >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:32:59 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused NetworkManager[791]: <info> (ens5): link connected >Oct 29 11:33:00 unused NetworkManager[791]: <info> Auto-activating connection 'ens5'. >Oct 29 11:33:00 unused NetworkManager[791]: <info> Activation (ens5) starting connection 'ens5' >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused NetworkManager[791]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) scheduled... >Oct 29 11:33:00 unused NetworkManager[791]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) started... >Oct 29 11:33:00 unused NetworkManager[791]: <info> (ens5): device state change: disconnected -> prepare (reason 'none') [30 40 0] >Oct 29 11:33:00 unused NetworkManager[791]: <info> NetworkManager state is now CONNECTING >Oct 29 11:33:00 unused NetworkManager[791]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) scheduled... >Oct 29 11:33:00 unused NetworkManager[791]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) complete. >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused NetworkManager[791]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) starting... >Oct 29 11:33:00 unused NetworkManager[791]: <info> (ens5): device state change: prepare -> config (reason 'none') [40 50 0] >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused NetworkManager[791]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) successful. >Oct 29 11:33:00 unused NetworkManager[791]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) complete. >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused audispd: queue is full - dropping event >Oct 29 11:33:00 unused kernel: e1000: ens5 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX >Oct 29 11:33:00 unused kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens5: link becomes ready >Oct 29 11:33:01 unused systemd: Started GNOME Display Manager. >Oct 29 11:33:01 unused dbus-daemon: dbus[677]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.17" (uid=0 pid=1817 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.18" (uid=0 pid=1837 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Oct 29 11:33:01 unused dbus[677]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.17" (uid=0 pid=1817 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.18" (uid=0 pid=1837 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Oct 29 11:33:02 unused journal: libvirt version: 1.2.8, package: 4.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2014-09-26-08:45:32, x86-021.build.eng.bos.redhat.com) >Oct 29 11:33:02 unused journal: Module /usr/lib64/libvirt/connection-driver/libvirt_driver_lxc.so not accessible >Oct 29 11:33:02 unused systemd: Started Virtualization daemon. >Oct 29 11:33:02 unused setroubleshoot: Plugin Exception restorecon >Oct 29 11:33:02 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:33:02 unused kdumpctl: kexec: loaded kdump kernel >Oct 29 11:33:02 unused kdumpctl: Starting kdump: [OK] >Oct 29 11:33:02 unused systemd: Started Crash recovery kernel arming. >Oct 29 11:33:02 unused NetworkManager[791]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) scheduled. >Oct 29 11:33:02 unused NetworkManager[791]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) started... >Oct 29 11:33:02 unused NetworkManager[791]: <info> (ens5): device state change: config -> ip-config (reason 'none') [50 70 0] >Oct 29 11:33:02 unused NetworkManager[791]: <info> Activation (ens5) Beginning DHCPv4 transaction (timeout in 45 seconds) >Oct 29 11:33:02 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:02 unused NetworkManager[791]: <info> dhclient started with pid 2516 >Oct 29 11:33:02 unused NetworkManager[791]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) complete. >Oct 29 11:33:02 unused systemd: Started Postfix Mail Transport Agent. >Oct 29 11:33:03 unused NetworkManager[791]: <info> (ens5): DHCPv4 state changed nbi -> preinit >Oct 29 11:33:03 unused dhclient[2516]: DHCPREQUEST on ens5 to 255.255.255.255 port 67 (xid=0x1638cee4) >Oct 29 11:33:03 unused dhclient[2516]: DHCPACK from 10.66.111.254 (xid=0x1638cee4) >Oct 29 11:33:03 unused dhclient[2516]: bound to 10.66.110.85 -- renewal in 6098 seconds. >Oct 29 11:33:03 unused NetworkManager[791]: <info> (ens5): DHCPv4 state changed preinit -> reboot >Oct 29 11:33:03 unused NetworkManager[791]: <info> address 10.66.110.85 >Oct 29 11:33:03 unused NetworkManager[791]: <info> plen 21 (255.255.248.0) >Oct 29 11:33:03 unused NetworkManager[791]: <info> gateway 10.66.111.254 >Oct 29 11:33:03 unused NetworkManager[791]: <info> server identifier 10.66.78.111 >Oct 29 11:33:03 unused NetworkManager[791]: <info> lease time 14400 >Oct 29 11:33:03 unused NetworkManager[791]: <info> nameserver '10.66.78.111' >Oct 29 11:33:03 unused NetworkManager[791]: <info> nameserver '10.66.78.117' >Oct 29 11:33:03 unused NetworkManager[791]: <info> nameserver '10.66.127.10' >Oct 29 11:33:03 unused NetworkManager[791]: <info> domain name 'englab.nay.redhat.com' >Oct 29 11:33:03 unused NetworkManager[791]: <info> domain name 'qe.lab.eng.nay.redhat.com' >Oct 29 11:33:03 unused NetworkManager[791]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Configure Commit) scheduled... >Oct 29 11:33:03 unused NetworkManager[791]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Commit) started... >Oct 29 11:33:03 unused NetworkManager[791]: <info> (ens5): device state change: ip-config -> ip-check (reason 'none') [70 80 0] >Oct 29 11:33:03 unused NetworkManager[791]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Commit) complete. >Oct 29 11:33:03 unused NetworkManager[791]: <info> (ens5): device state change: ip-check -> secondaries (reason 'none') [80 90 0] >Oct 29 11:33:03 unused NetworkManager[791]: <info> (ens5): device state change: secondaries -> activated (reason 'none') [90 100 0] >Oct 29 11:33:03 unused NetworkManager[791]: <info> NetworkManager state is now CONNECTED_LOCAL >Oct 29 11:33:03 unused avahi-daemon[649]: Joining mDNS multicast group on interface ens5.IPv4 with address 10.66.110.85. >Oct 29 11:33:03 unused avahi-daemon[649]: New relevant interface ens5.IPv4 for mDNS. >Oct 29 11:33:03 unused avahi-daemon[649]: Registering new address record for 10.66.110.85 on ens5.IPv4. >Oct 29 11:33:03 unused NetworkManager[791]: <info> Policy set 'ens5' (ens5) as default for IPv4 routing and DNS. >Oct 29 11:33:03 unused NetworkManager[791]: <info> Activation (ens5) successful, device activated. >Oct 29 11:33:03 unused dbus-daemon: dbus[677]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Oct 29 11:33:03 unused dbus[677]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Oct 29 11:33:03 unused systemd: Starting Network Manager Script Dispatcher Service... >Oct 29 11:33:03 unused dbus-daemon: dbus[677]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Oct 29 11:33:03 unused dbus[677]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Oct 29 11:33:03 unused systemd: Started Network Manager Script Dispatcher Service. >Oct 29 11:33:03 unused setroubleshoot: Plugin Exception restorecon_source >Oct 29 11:33:03 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:33:03 unused systemd: Unit iscsi.service cannot be reloaded because it is inactive. >Oct 29 11:33:03 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:03 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:33:03 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:03 unused systemd: Started Wait for Plymouth Boot Screen to Quit. >Oct 29 11:33:03 unused systemd: Starting Serial Getty on ttyS0... >Oct 29 11:33:03 unused systemd: Started Serial Getty on ttyS0. >Oct 29 11:33:03 unused systemd: Starting Login Prompts. >Oct 29 11:33:04 unused systemd: Reached target Login Prompts. >Oct 29 11:33:04 unused systemd: Starting Multi-User System. >Oct 29 11:33:04 unused systemd: Reached target Multi-User System. >Oct 29 11:33:04 unused systemd: Starting Graphical Interface. >Oct 29 11:33:04 unused systemd: Reached target Graphical Interface. >Oct 29 11:33:04 unused systemd: Starting Update UTMP about System Runlevel Changes... >Oct 29 11:33:04 unused systemd: Started Stop Read-Ahead Data Collection 10s After Completed Startup. >Oct 29 11:33:04 unused systemd: Started Update UTMP about System Runlevel Changes. >Oct 29 11:33:04 unused systemd: Startup finished in 786ms (kernel) + 2.020s (initrd) + 27.480s (userspace) = 30.286s. >Oct 29 11:33:04 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:33:04 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:04 unused systemd: Starting user-42.slice. >Oct 29 11:33:04 unused systemd: Created slice user-42.slice. >Oct 29 11:33:04 unused systemd: Starting Session c1 of user gdm. >Oct 29 11:33:04 unused systemd: Started Session c1 of user gdm. >Oct 29 11:33:04 unused systemd-logind: New session c1 of user gdm. >Oct 29 11:33:04 unused systemd-logind: Linked /tmp/.X11-unix/X0 to /run/user/42/X11-display. >Oct 29 11:33:04 unused avahi-daemon[649]: Registering new address record for fe80::984e:4fff:fe50:5152 on ens5.*. >Oct 29 11:33:04 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:33:04 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:04 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4232f3ec-5ccd-4850-ba76-4a70ff4565b6 >Oct 29 11:33:04 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:04 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 29 11:33:05 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:05 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 29 11:33:05 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:05 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f60195bb-d64d-4eb0-a8f4-cf8a2b920ac8 >Oct 29 11:33:05 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:05 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5ab16217-4ece-422d-83ed-2d510b7f6e4a >Oct 29 11:33:05 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:05 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l adc127d5-3ba3-4600-a18a-c60d41d563f5 >Oct 29 11:33:05 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:05 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:33:05 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:05 unused NetworkManager[791]: <info> startup complete >Oct 29 11:33:05 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 06db745f-002f-4e84-a79a-b463031747bc >Oct 29 11:33:05 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:05 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 06db745f-002f-4e84-a79a-b463031747bc >Oct 29 11:33:05 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:06 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:33:06 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:06 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8a2839f5-9652-4d11-b7f0-45cf9ee50720 >Oct 29 11:33:06 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:06 unused dbus-daemon: dbus[677]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Oct 29 11:33:06 unused dbus[677]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Oct 29 11:33:06 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:33:06 unused systemd: Starting Daemon for power management... >Oct 29 11:33:06 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:06 unused dbus-daemon: dbus[677]: [system] Successfully activated service 'org.freedesktop.UPower' >Oct 29 11:33:06 unused dbus[677]: [system] Successfully activated service 'org.freedesktop.UPower' >Oct 29 11:33:06 unused systemd: Started Daemon for power management. >Oct 29 11:33:06 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:33:06 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:06 unused gnome-session: (gnome-settings-daemon:2795): power-plugin-WARNING **: failed to turn the panel on: Display is not DPMS capable >Oct 29 11:33:06 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l bb129500-3477-472a-b1a1-1b7d123c1da8 >Oct 29 11:33:06 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:06 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d95da5c3-8c53-450d-a9b2-dfb19b652de8 >Oct 29 11:33:06 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:06 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l db8f5c38-2bac-4875-a619-b204531cc812 >Oct 29 11:33:06 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:07 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 149193bb-28ed-4b94-9604-5e107a9da7e2 >Oct 29 11:33:07 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:07 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2003831-eae3-45bc-9b03-1dd96a73f949 >Oct 29 11:33:07 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:07 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d95da5c3-8c53-450d-a9b2-dfb19b652de8 >Oct 29 11:33:07 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:07 unused dbus-daemon: dbus[677]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Oct 29 11:33:07 unused dbus[677]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Oct 29 11:33:07 unused gnome-session: Entering running state >Oct 29 11:33:07 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:33:07 unused systemd: Starting Manage, Install and Generate Color Profiles... >Oct 29 11:33:07 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:07 unused colord: Using config file /etc/colord.conf >Oct 29 11:33:07 unused colord: Using mapping database file /var/lib/colord/mapping.db >Oct 29 11:33:07 unused colord: Using device database file /var/lib/colord/storage.db >Oct 29 11:33:07 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5ab16217-4ece-422d-83ed-2d510b7f6e4a >Oct 29 11:33:07 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:07 unused colord: loaded plugin libcd_plugin_camera.so >Oct 29 11:33:07 unused colord: loaded plugin libcd_plugin_scanner.so >Oct 29 11:33:07 unused colord: Daemon ready for requests >Oct 29 11:33:07 unused dbus-daemon: dbus[677]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Oct 29 11:33:07 unused dbus[677]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Oct 29 11:33:07 unused systemd: Started Manage, Install and Generate Color Profiles. >Oct 29 11:33:07 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 11:33:07 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:07 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 41005440-a55b-4233-93f3-db86ea99daba >Oct 29 11:33:07 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:07 unused colord: Profile added: icc-021ec903471f953c28c57ccde43f9134 >Oct 29 11:33:07 unused colord: Profile added: icc-7e1e684edc9a0671f5305d656d8cb8c9 >Oct 29 11:33:07 unused colord: Profile added: icc-0f6451e33e7342d0f90bb960912bb812 >Oct 29 11:33:07 unused colord: Profile added: icc-8f465237bb45ee1d16fdbd6b4038c719 >Oct 29 11:33:07 unused colord: Profile added: icc-8daff74b7142df23f76b3d5ef126bbf9 >Oct 29 11:33:07 unused colord: Profile added: icc-f16a3fe7a0d2f471188cf45202ae43ac >Oct 29 11:33:08 unused rtkit-daemon[674]: Successfully made thread 3064 of process 3064 (/usr/bin/pulseaudio) owned by '42' high priority at nice level -11. >Oct 29 11:33:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l af15d032-e5b6-477a-a4e0-d0db84c92e84 >Oct 29 11:33:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l af15d032-e5b6-477a-a4e0-d0db84c92e84 >Oct 29 11:33:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:08 unused dbus-daemon: dbus[677]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 29 11:33:08 unused dbus[677]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 29 11:33:08 unused systemd: Starting Locale Service... >Oct 29 11:33:08 unused gnome-session: (gnome-settings-daemon:2795): color-plugin-WARNING **: failed to get edid: unable to get EDID for output >Oct 29 11:33:08 unused dbus-daemon: dbus[677]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 29 11:33:08 unused dbus[677]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 29 11:33:08 unused systemd: Started Locale Service. >Oct 29 11:33:08 unused colord: Device added: xrandr-Virtual-0 >Oct 29 11:33:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 75ef4f58-c198-49a6-9668-ae14c8a7007b >Oct 29 11:33:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b91b4263-e2c9-413f-9c5f-7869cacdb578 >Oct 29 11:33:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:08 unused gnome-session: (gnome-settings-daemon:2795): color-plugin-WARNING **: unable to get EDID for xrandr-Virtual-0: unable to get EDID for output >Oct 29 11:33:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 97aea7ca-00fe-4e40-af8e-e0ec40282528 >Oct 29 11:33:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 94cf47a7-5a5c-405c-ab69-1601b787f238 >Oct 29 11:33:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 05d5fa63-cbd7-453f-b673-c378b16914f0 >Oct 29 11:33:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:08 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::primary after class was initialised >Oct 29 11:33:08 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::index after class was initialised >Oct 29 11:33:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:33:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:33:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:33:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8a64fd6d-c54b-4627-b7b5-44f0b14979dd >Oct 29 11:33:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 396a1310-4088-41c8-90a8-d43b4f19499c >Oct 29 11:33:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 396a1310-4088-41c8-90a8-d43b4f19499c >Oct 29 11:33:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d772382b-e332-4fba-8873-f558166b6023 >Oct 29 11:33:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2094586-a8f8-4bc1-af02-534887cfd2f4 >Oct 29 11:33:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2094586-a8f8-4bc1-af02-534887cfd2f4 >Oct 29 11:33:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0b13c0cf-312e-4166-b485-88d815f566fb >Oct 29 11:33:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b427ecb2-8229-4dc3-b9ee-ffea01dcd104 >Oct 29 11:33:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:33:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0e7f911c-862c-4a1b-bdef-924387d5c7e9 >Oct 29 11:33:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:10 unused gnome-session: JS LOG: GNOME Shell started at Wed Oct 29 2014 11:33:10 GMT+0800 (CST) >Oct 29 11:33:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:33:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 04b4c9d6-e337-439c-bb70-255a7898dcb3 >Oct 29 11:33:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:33:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:11 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5f10f707-7a84-461f-9e81-f835d4ea195d >Oct 29 11:33:11 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:11 unused dbus-daemon: dbus[677]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Oct 29 11:33:11 unused dbus[677]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Oct 29 11:33:11 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:33:11 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:11 unused systemd: Starting Fingerprint Authentication Daemon... >Oct 29 11:33:11 unused dbus-daemon: dbus[677]: [system] Successfully activated service 'net.reactivated.Fprint' >Oct 29 11:33:11 unused dbus[677]: [system] Successfully activated service 'net.reactivated.Fprint' >Oct 29 11:33:11 unused systemd: Started Fingerprint Authentication Daemon. >Oct 29 11:33:11 unused fprintd: Launching FprintObject >Oct 29 11:33:11 unused fprintd: ** Message: D-Bus service launched with name: net.reactivated.Fprint >Oct 29 11:33:11 unused fprintd: ** Message: entering main loop >Oct 29 11:33:11 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0e378e0b-9b3c-4d2f-84b9-ce2845665953 >Oct 29 11:33:11 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:11 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b94cfdf3-87b2-4b6e-abf5-837aee9d5e47 >Oct 29 11:33:11 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:11 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:33:11 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:11 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 829d18ca-3d16-4e5a-8496-a95d9ab10d6c >Oct 29 11:33:11 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:11 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 63dc4b7a-9372-4551-bd5d-9f0980157bc4 >Oct 29 11:33:11 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:12 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l be15d920-943b-4dae-ab10-813bdf4c9056 >Oct 29 11:33:12 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:12 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:33:12 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:12 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f31e2e16-ef9a-43df-bba1-a28015fc34cb >Oct 29 11:33:12 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:12 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:33:12 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:12 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f31e2e16-ef9a-43df-bba1-a28015fc34cb >Oct 29 11:33:12 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:12 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:33:12 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:12 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:33:12 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:13 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:33:13 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:13 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:33:13 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:13 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:33:13 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:13 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 88a7869a-040a-4f0e-80c5-b6a4e8755bb3 >Oct 29 11:33:13 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:13 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:33:13 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:13 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:33:13 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:13 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l dc7e7c9b-7e67-4b25-821f-418ef1def3e4 >Oct 29 11:33:13 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:13 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:33:13 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:14 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:33:14 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:14 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:33:14 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:14 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8dd8c574-fc63-4b6f-9f6c-45c2df7870d4 >Oct 29 11:33:14 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:14 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 11:33:14 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:14 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 3ed0fa73-53ef-48c0-bb88-c1fd8f856461 >Oct 29 11:33:14 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:14 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 11:33:14 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:33:14 unused dbus-daemon: string index out of range >Oct 29 11:33:14 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 29 11:33:18 unused systemd: Starting user-0.slice. >Oct 29 11:33:18 unused systemd: Created slice user-0.slice. >Oct 29 11:33:18 unused systemd: Starting Session 1 of user root. >Oct 29 11:33:18 unused systemd-logind: New session 1 of user root. >Oct 29 11:33:18 unused systemd: Started Session 1 of user root. >Oct 29 11:33:41 unused fprintd: ** Message: No devices in use, exit >Oct 29 11:34:42 unused systemd: Stopping Session 1 of user root. >Oct 29 11:34:42 unused systemd: Stopping Session c1 of user gdm. >Oct 29 11:34:42 unused systemd: Stopping LVM2 PV scan on device 8:2... >Oct 29 11:34:42 unused systemd: Stopping system-getty.slice. >Oct 29 11:34:42 unused systemd: Removed slice system-getty.slice. >Oct 29 11:34:42 unused systemd: Stopping Dump dmesg to /var/log/dmesg... >Oct 29 11:34:42 unused systemd: Stopped Dump dmesg to /var/log/dmesg. >Oct 29 11:34:42 unused systemd: Stopping Graphical Interface. >Oct 29 11:34:42 unused systemd: Stopped target Graphical Interface. >Oct 29 11:34:42 unused systemd: Stopping Multi-User System. >Oct 29 11:34:42 unused systemd: Stopped target Multi-User System. >Oct 29 11:34:42 unused systemd: Stopping Command Scheduler... >Oct 29 11:34:42 unused rsyslogd: [origin software="rsyslogd" swVersion="7.4.7" x-pid="655" x-info="http://www.rsyslog.com"] exiting on signal 15. >Oct 29 11:35:49 unused rsyslogd: [origin software="rsyslogd" swVersion="7.4.7" x-pid="655" x-info="http://www.rsyslog.com"] start >Oct 29 11:35:34 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:35:34 unused kernel: Initializing cgroup subsys cpuset >Oct 29 11:35:34 unused kernel: Initializing cgroup subsys cpu >Oct 29 11:35:34 unused kernel: Initializing cgroup subsys cpuacct >Oct 29 11:35:34 unused kernel: Linux version 3.10.0-196.el7.x86_64 (mockbuild@x86-018.build.eng.bos.redhat.com) (gcc version 4.8.3 20140911 (Red Hat 4.8.3-7) (GCC) ) #1 SMP Tue Oct 28 11:16:22 EDT 2014 >Oct 29 11:35:34 unused kernel: Command line: BOOT_IMAGE=/vmlinuz-3.10.0-196.el7.x86_64 root=/dev/mapper/rhel_unused-root ro crashkernel=auto rd.lvm.lv=rhel_unused/root rd.lvm.lv=rhel_unused/swap console=tty0 console=ttyS0,115200 LANG=en_US.UTF-8 systemd.debug >Oct 29 11:35:34 unused kernel: e820: BIOS-provided physical RAM map: >Oct 29 11:35:34 unused kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable >Oct 29 11:35:34 unused kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved >Oct 29 11:35:34 unused kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved >Oct 29 11:35:34 unused kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdffff] usable >Oct 29 11:35:34 unused kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved >Oct 29 11:35:34 unused kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved >Oct 29 11:35:34 unused kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved >Oct 29 11:35:34 unused kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable >Oct 29 11:35:34 unused kernel: NX (Execute Disable) protection: active >Oct 29 11:35:34 unused kernel: SMBIOS 2.8 present. >Oct 29 11:35:34 unused kernel: Hypervisor detected: KVM >Oct 29 11:35:34 unused kernel: No AGP bridge found >Oct 29 11:35:34 unused kernel: e820: last_pfn = 0x140000 max_arch_pfn = 0x400000000 >Oct 29 11:35:34 unused kernel: x86 PAT enabled: cpu 0, old 0x7040600070406, new 0x7010600070106 >Oct 29 11:35:34 unused kernel: e820: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 >Oct 29 11:35:34 unused kernel: found SMP MP-table at [mem 0x000f2030-0x000f203f] mapped at [ffff8800000f2030] >Oct 29 11:35:34 unused kernel: init_memory_mapping: [mem 0x00000000-0x000fffff] >Oct 29 11:35:34 unused kernel: init_memory_mapping: [mem 0x13fe00000-0x13fffffff] >Oct 29 11:35:34 unused kernel: init_memory_mapping: [mem 0x13c000000-0x13fdfffff] >Oct 29 11:35:34 unused kernel: init_memory_mapping: [mem 0x100000000-0x13bffffff] >Oct 29 11:35:34 unused kernel: init_memory_mapping: [mem 0x00100000-0xbffdffff] >Oct 29 11:35:34 unused kernel: RAMDISK: [mem 0x35d2e000-0x36e8efff] >Oct 29 11:35:34 unused kernel: ACPI: RSDP 00000000000f1d90 00014 (v00 BOCHS ) >Oct 29 11:35:34 unused kernel: ACPI: RSDT 00000000bffe1931 00030 (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001) >Oct 29 11:35:34 unused kernel: ACPI: FACP 00000000bffe0b37 00074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001) >Oct 29 11:35:34 unused kernel: ACPI: DSDT 00000000bffe0040 00AF7 (v01 BOCHS BXPCDSDT 00000001 BXPC 00000001) >Oct 29 11:35:34 unused kernel: ACPI: FACS 00000000bffe0000 00040 >Oct 29 11:35:34 unused kernel: ACPI: SSDT 00000000bffe0bab 00CF6 (v01 BOCHS BXPCSSDT 00000001 BXPC 00000001) >Oct 29 11:35:34 unused kernel: ACPI: APIC 00000000bffe18a1 00090 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001) >Oct 29 11:35:34 unused kernel: No NUMA configuration found >Oct 29 11:35:34 unused kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] >Oct 29 11:35:34 unused kernel: Initmem setup node 0 [mem 0x00000000-0x13fffffff] >Oct 29 11:35:34 unused kernel: NODE_DATA [mem 0x13ffd6000-0x13fffcfff] >Oct 29 11:35:34 unused kernel: Reserving 161MB of memory at 688MB for crashkernel (System RAM: 4095MB) >Oct 29 11:35:34 unused kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 >Oct 29 11:35:34 unused kernel: kvm-clock: cpu 0, msr 1:3ff86001, primary cpu clock >Oct 29 11:35:34 unused kernel: Zone ranges: >Oct 29 11:35:34 unused kernel: DMA [mem 0x00001000-0x00ffffff] >Oct 29 11:35:34 unused kernel: DMA32 [mem 0x01000000-0xffffffff] >Oct 29 11:35:34 unused kernel: Normal [mem 0x100000000-0x13fffffff] >Oct 29 11:35:34 unused kernel: Movable zone start for each node >Oct 29 11:35:34 unused kernel: Early memory node ranges >Oct 29 11:35:34 unused kernel: node 0: [mem 0x00001000-0x0009efff] >Oct 29 11:35:34 unused kernel: node 0: [mem 0x00100000-0xbffdffff] >Oct 29 11:35:34 unused kernel: node 0: [mem 0x100000000-0x13fffffff] >Oct 29 11:35:34 unused kernel: ACPI: PM-Timer IO Port: 0x608 >Oct 29 11:35:34 unused kernel: ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled) >Oct 29 11:35:34 unused kernel: ACPI: LAPIC (acpi_id[0x01] lapic_id[0x01] enabled) >Oct 29 11:35:34 unused kernel: ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled) >Oct 29 11:35:34 unused kernel: ACPI: LAPIC (acpi_id[0x03] lapic_id[0x03] enabled) >Oct 29 11:35:34 unused kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) >Oct 29 11:35:34 unused kernel: ACPI: IOAPIC (id[0x00] address[0xfec00000] gsi_base[0]) >Oct 29 11:35:34 unused kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 >Oct 29 11:35:34 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) >Oct 29 11:35:34 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) >Oct 29 11:35:34 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) >Oct 29 11:35:34 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) >Oct 29 11:35:34 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) >Oct 29 11:35:34 unused kernel: Using ACPI (MADT) for SMP configuration information >Oct 29 11:35:34 unused kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs >Oct 29 11:35:34 unused kernel: PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff] >Oct 29 11:35:34 unused kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000effff] >Oct 29 11:35:34 unused kernel: PM: Registered nosave memory: [mem 0x000f0000-0x000fffff] >Oct 29 11:35:34 unused kernel: PM: Registered nosave memory: [mem 0xbffe0000-0xbfffffff] >Oct 29 11:35:34 unused kernel: PM: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] >Oct 29 11:35:34 unused kernel: PM: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] >Oct 29 11:35:34 unused kernel: PM: Registered nosave memory: [mem 0xff000000-0xfffbffff] >Oct 29 11:35:34 unused kernel: PM: Registered nosave memory: [mem 0xfffc0000-0xffffffff] >Oct 29 11:35:34 unused kernel: e820: [mem 0xc0000000-0xfeffbfff] available for PCI devices >Oct 29 11:35:34 unused kernel: Booting paravirtualized kernel on KVM >Oct 29 11:35:34 unused kernel: setup_percpu: NR_CPUS:5120 nr_cpumask_bits:4 nr_cpu_ids:4 nr_node_ids:1 >Oct 29 11:35:34 unused kernel: PERCPU: Embedded 29 pages/cpu @ffff88013fc00000 s86720 r8192 d23872 u524288 >Oct 29 11:35:34 unused kernel: KVM setup async PF for cpu 0 >Oct 29 11:35:34 unused kernel: kvm-stealtime: cpu 0, msr 13fc0e000 >Oct 29 11:35:34 unused kernel: Built 1 zonelists in Node order, mobility grouping on. Total pages: 1032041 >Oct 29 11:35:34 unused kernel: Policy zone: Normal >Oct 29 11:35:34 unused kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-3.10.0-196.el7.x86_64 root=/dev/mapper/rhel_unused-root ro crashkernel=auto rd.lvm.lv=rhel_unused/root rd.lvm.lv=rhel_unused/swap console=tty0 console=ttyS0,115200 LANG=en_US.UTF-8 systemd.debug >Oct 29 11:35:34 unused kernel: PID hash table entries: 4096 (order: 3, 32768 bytes) >Oct 29 11:35:34 unused kernel: xsave: enabled xstate_bv 0x7, cntxt size 0x340 >Oct 29 11:35:34 unused kernel: Checking aperture... >Oct 29 11:35:34 unused kernel: No AGP bridge found >Oct 29 11:35:34 unused kernel: Memory: 3863488k/5242880k available (6240k kernel code, 1049096k absent, 330296k reserved, 4181k data, 1604k init) >Oct 29 11:35:34 unused kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 >Oct 29 11:35:34 unused kernel: Hierarchical RCU implementation. >Oct 29 11:35:34 unused kernel: RCU restricting CPUs from NR_CPUS=5120 to nr_cpu_ids=4. >Oct 29 11:35:34 unused kernel: Experimental no-CBs for all CPUs >Oct 29 11:35:34 unused kernel: Experimental no-CBs CPUs: 0-3. >Oct 29 11:35:34 unused kernel: NR_IRQS:327936 nr_irqs:712 16 >Oct 29 11:35:34 unused kernel: Console: colour VGA+ 80x25 >Oct 29 11:35:34 unused kernel: console [tty0] enabled >Oct 29 11:35:34 unused kernel: console [ttyS0] enabled >Oct 29 11:35:34 unused kernel: allocated 16777216 bytes of page_cgroup >Oct 29 11:35:34 unused kernel: please try 'cgroup_disable=memory' option if you don't want memory cgroups >Oct 29 11:35:34 unused kernel: tsc: Detected 1999.999 MHz processor >Oct 29 11:35:34 unused kernel: Calibrating delay loop (skipped) preset value.. 3999.99 BogoMIPS (lpj=1999999) >Oct 29 11:35:34 unused kernel: pid_max: default: 32768 minimum: 301 >Oct 29 11:35:34 unused kernel: Security Framework initialized >Oct 29 11:35:34 unused kernel: SELinux: Initializing. >Oct 29 11:35:34 unused kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes) >Oct 29 11:35:34 unused kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes) >Oct 29 11:35:34 unused kernel: Mount-cache hash table entries: 4096 >Oct 29 11:35:34 unused kernel: Initializing cgroup subsys memory >Oct 29 11:35:34 unused kernel: Initializing cgroup subsys devices >Oct 29 11:35:34 unused kernel: Initializing cgroup subsys freezer >Oct 29 11:35:34 unused kernel: Initializing cgroup subsys net_cls >Oct 29 11:35:34 unused kernel: Initializing cgroup subsys blkio >Oct 29 11:35:34 unused kernel: Initializing cgroup subsys perf_event >Oct 29 11:35:34 unused kernel: Initializing cgroup subsys hugetlb >Oct 29 11:35:34 unused kernel: CPU: Physical Processor ID: 0 >Oct 29 11:35:34 unused kernel: CPU: Processor Core ID: 0 >Oct 29 11:35:34 unused kernel: mce: CPU supports 10 MCE banks >Oct 29 11:35:34 unused kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 >Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0 >tlb_flushall_shift: 6 >Oct 29 11:35:34 unused kernel: Freeing SMP alternatives: 24k freed >Oct 29 11:35:34 unused kernel: ACPI: Core revision 20130517 >Oct 29 11:35:34 unused kernel: ACPI: All ACPI Tables successfully acquired >Oct 29 11:35:34 unused kernel: ftrace: allocating 23897 entries in 94 pages >Oct 29 11:35:34 unused kernel: Enabling x2apic >Oct 29 11:35:34 unused kernel: Enabled x2apic >Oct 29 11:35:34 unused kernel: Switched APIC routing to physical x2apic. >Oct 29 11:35:34 unused kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 >Oct 29 11:35:34 unused kernel: smpboot: CPU0: Intel Xeon E312xx (Sandy Bridge) (fam: 06, model: 2a, stepping: 01) >Oct 29 11:35:34 unused kernel: Performance Events: unsupported p6 CPU model 42 no PMU driver, software events only. >Oct 29 11:35:34 unused kernel: KVM setup paravirtual spinlock >Oct 29 11:35:34 unused kernel: NMI watchdog: disabled (cpu0): hardware events not enabled >Oct 29 11:35:34 unused kernel: kvm-clock: cpu 1, msr 1:3ff86041, secondary cpu clock >Oct 29 11:35:34 unused kernel: KVM setup async PF for cpu 1 >Oct 29 11:35:34 unused kernel: kvm-stealtime: cpu 1, msr 13fc8e000 >Oct 29 11:35:34 unused kernel: kvm-clock: cpu 2, msr 1:3ff86081, secondary cpu clock >Oct 29 11:35:34 unused kernel: KVM setup async PF for cpu 2 >Oct 29 11:35:34 unused kernel: smpboot: Booting Node 0, Processors #1 #2 #3 OK >Oct 29 11:35:34 unused kernel: kvm-stealtime: cpu 2, msr 13fd0e000 >Oct 29 11:35:34 unused kernel: kvm-clock: cpu 3, msr 1:3ff860c1, secondary cpu clock >Oct 29 11:35:34 unused kernel: Brought up 4 CPUs >Oct 29 11:35:34 unused kernel: KVM setup async PF for cpu 3 >Oct 29 11:35:34 unused kernel: kvm-stealtime: cpu 3, msr 13fd8e000 >Oct 29 11:35:34 unused kernel: smpboot: Total of 4 processors activated (15999.99 BogoMIPS) >Oct 29 11:35:34 unused kernel: devtmpfs: initialized >Oct 29 11:35:34 unused kernel: EVM: security.selinux >Oct 29 11:35:34 unused kernel: EVM: security.ima >Oct 29 11:35:34 unused kernel: EVM: security.capability >Oct 29 11:35:34 unused kernel: atomic64 test passed for x86-64 platform with CX8 and with SSE >Oct 29 11:35:34 unused kernel: NET: Registered protocol family 16 >Oct 29 11:35:34 unused kernel: ACPI: bus type PCI registered >Oct 29 11:35:34 unused kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 >Oct 29 11:35:34 unused kernel: PCI: Using configuration type 1 for base access >Oct 29 11:35:34 unused kernel: ACPI: Added _OSI(Module Device) >Oct 29 11:35:34 unused kernel: ACPI: Added _OSI(Processor Device) >Oct 29 11:35:34 unused kernel: ACPI: Added _OSI(3.0 _SCP Extensions) >Oct 29 11:35:34 unused kernel: ACPI: Added _OSI(Processor Aggregator Device) >Oct 29 11:35:34 unused kernel: ACPI: Interpreter enabled >Oct 29 11:35:34 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S1_] (20130517/hwxface-571) >Oct 29 11:35:34 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S2_] (20130517/hwxface-571) >Oct 29 11:35:34 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S3_] (20130517/hwxface-571) >Oct 29 11:35:34 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S4_] (20130517/hwxface-571) >Oct 29 11:35:34 unused kernel: ACPI: (supports S0 S5) >Oct 29 11:35:34 unused kernel: ACPI: Using IOAPIC for interrupt routing >Oct 29 11:35:34 unused kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug >Oct 29 11:35:34 unused kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) >Oct 29 11:35:34 unused kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI] >Oct 29 11:35:34 unused kernel: acpi PNP0A03:00: _OSC failed (AE_NOT_FOUND); disabling ASPM >Oct 29 11:35:34 unused kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. >Oct 29 11:35:34 unused kernel: acpiphp: Slot [4] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [5] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [6] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [7] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [8] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [9] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [10] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [11] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [12] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [13] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [14] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [15] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [16] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [17] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [18] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [19] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [20] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [21] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [22] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [23] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [24] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [25] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [26] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [27] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [28] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [29] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [30] registered >Oct 29 11:35:34 unused kernel: acpiphp: Slot [31] registered >Oct 29 11:35:34 unused kernel: PCI host bridge to bus 0000:00 >Oct 29 11:35:34 unused kernel: pci_bus 0000:00: root bus resource [bus 00-ff] >Oct 29 11:35:34 unused kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7] >Oct 29 11:35:34 unused kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xadff] >Oct 29 11:35:34 unused kernel: pci_bus 0000:00: root bus resource [io 0xae0f-0xaeff] >Oct 29 11:35:34 unused kernel: pci_bus 0000:00: root bus resource [io 0xaf20-0xafdf] >Oct 29 11:35:34 unused kernel: pci_bus 0000:00: root bus resource [io 0xafe4-0xffff] >Oct 29 11:35:34 unused kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff] >Oct 29 11:35:34 unused kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff] >Oct 29 11:35:34 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] >Oct 29 11:35:34 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] >Oct 29 11:35:34 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] >Oct 29 11:35:34 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] >Oct 29 11:35:34 unused kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI >Oct 29 11:35:34 unused kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB >Oct 29 11:35:34 unused kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) >Oct 29 11:35:34 unused kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) >Oct 29 11:35:34 unused kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) >Oct 29 11:35:34 unused kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) >Oct 29 11:35:34 unused kernel: ACPI: PCI Interrupt Link [LNKS] (IRQs *9) >Oct 29 11:35:34 unused kernel: ACPI: Enabled 16 GPEs in block 00 to 0F >Oct 29 11:35:34 unused kernel: vgaarb: device added: PCI:0000:00:02.0,decodes=io+mem,owns=io+mem,locks=none >Oct 29 11:35:34 unused kernel: vgaarb: loaded >Oct 29 11:35:34 unused kernel: vgaarb: bridge control possible 0000:00:02.0 >Oct 29 11:35:34 unused kernel: SCSI subsystem initialized >Oct 29 11:35:34 unused kernel: ACPI: bus type USB registered >Oct 29 11:35:34 unused kernel: usbcore: registered new interface driver usbfs >Oct 29 11:35:34 unused kernel: usbcore: registered new interface driver hub >Oct 29 11:35:34 unused kernel: usbcore: registered new device driver usb >Oct 29 11:35:34 unused kernel: PCI: Using ACPI for IRQ routing >Oct 29 11:35:34 unused kernel: NetLabel: Initializing >Oct 29 11:35:34 unused kernel: NetLabel: domain hash size = 128 >Oct 29 11:35:34 unused kernel: NetLabel: protocols = UNLABELED CIPSOv4 >Oct 29 11:35:34 unused kernel: NetLabel: unlabeled traffic allowed by default >Oct 29 11:35:34 unused kernel: Switching to clocksource kvm-clock >Oct 29 11:35:34 unused kernel: pnp: PnP ACPI init >Oct 29 11:35:34 unused kernel: ACPI: bus type PNP registered >Oct 29 11:35:34 unused kernel: pnp: PnP ACPI: found 5 devices >Oct 29 11:35:34 unused kernel: ACPI: bus type PNP unregistered >Oct 29 11:35:34 unused kernel: NET: Registered protocol family 2 >Oct 29 11:35:34 unused kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes) >Oct 29 11:35:34 unused kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes) >Oct 29 11:35:34 unused kernel: TCP: Hash tables configured (established 32768 bind 32768) >Oct 29 11:35:34 unused kernel: TCP: reno registered >Oct 29 11:35:34 unused kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes) >Oct 29 11:35:34 unused kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes) >Oct 29 11:35:34 unused kernel: NET: Registered protocol family 1 >Oct 29 11:35:34 unused kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers >Oct 29 11:35:34 unused kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release >Oct 29 11:35:34 unused kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds >Oct 29 11:35:34 unused kernel: ACPI: PCI Interrupt Link [LNKC] enabled at IRQ 11 >Oct 29 11:35:34 unused kernel: Unpacking initramfs... >Oct 29 11:35:34 unused kernel: Freeing initrd memory: 17796k freed >Oct 29 11:35:34 unused kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) >Oct 29 11:35:34 unused kernel: software IO TLB [mem 0xbbfe0000-0xbffe0000] (64MB) mapped at [ffff8800bbfe0000-ffff8800bffdffff] >Oct 29 11:35:34 unused kernel: microcode: CPU0 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:35:34 unused kernel: microcode: CPU1 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:35:34 unused kernel: microcode: CPU2 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:35:34 unused kernel: microcode: CPU3 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 11:35:34 unused kernel: microcode: Microcode Update Driver: v2.00 <tigran@aivazian.fsnet.co.uk>, Peter Oruba >Oct 29 11:35:34 unused kernel: futex hash table entries: 1024 (order: 4, 65536 bytes) >Oct 29 11:35:34 unused kernel: Initialise system trusted keyring >Oct 29 11:35:34 unused kernel: audit: initializing netlink socket (disabled) >Oct 29 11:35:34 unused kernel: type=2000 audit(1414553734.940:1): initialized >Oct 29 11:35:34 unused kernel: HugeTLB registered 2 MB page size, pre-allocated 0 pages >Oct 29 11:35:34 unused kernel: zbud: loaded >Oct 29 11:35:34 unused kernel: VFS: Disk quotas dquot_6.5.2 >Oct 29 11:35:34 unused kernel: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) >Oct 29 11:35:34 unused kernel: msgmni has been set to 7580 >Oct 29 11:35:34 unused kernel: Key type big_key registered >Oct 29 11:35:34 unused kernel: alg: No test for stdrng (krng) >Oct 29 11:35:34 unused kernel: NET: Registered protocol family 38 >Oct 29 11:35:34 unused kernel: Key type asymmetric registered >Oct 29 11:35:34 unused kernel: Asymmetric key parser 'x509' registered >Oct 29 11:35:34 unused kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 252) >Oct 29 11:35:34 unused kernel: io scheduler noop registered >Oct 29 11:35:34 unused kernel: io scheduler deadline registered (default) >Oct 29 11:35:34 unused kernel: io scheduler cfq registered >Oct 29 11:35:34 unused kernel: pci_hotplug: PCI Hot Plug PCI Core version: 0.5 >Oct 29 11:35:34 unused kernel: pciehp: PCI Express Hot Plug Controller Driver version: 0.4 >Oct 29 11:35:34 unused kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 >Oct 29 11:35:34 unused kernel: ACPI: Power Button [PWRF] >Oct 29 11:35:34 unused kernel: GHES: HEST is not enabled! >Oct 29 11:35:34 unused kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled >Oct 29 11:35:34 unused kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A >Oct 29 11:35:34 unused kernel: Non-volatile memory driver v1.3 >Oct 29 11:35:34 unused kernel: Linux agpgart interface v0.103 >Oct 29 11:35:34 unused kernel: crash memory driver: version 1.1 >Oct 29 11:35:34 unused kernel: rdac: device handler registered >Oct 29 11:35:34 unused kernel: hp_sw: device handler registered >Oct 29 11:35:34 unused kernel: emc: device handler registered >Oct 29 11:35:34 unused kernel: alua: device handler registered >Oct 29 11:35:34 unused kernel: libphy: Fixed MDIO Bus: probed >Oct 29 11:35:34 unused kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver >Oct 29 11:35:34 unused kernel: ehci-pci: EHCI PCI platform driver >Oct 29 11:35:34 unused kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver >Oct 29 11:35:34 unused kernel: ohci-pci: OHCI PCI platform driver >Oct 29 11:35:34 unused kernel: uhci_hcd: USB Universal Host Controller Interface driver >Oct 29 11:35:34 unused kernel: uhci_hcd 0000:00:03.0: UHCI Host Controller >Oct 29 11:35:34 unused kernel: uhci_hcd 0000:00:03.0: new USB bus registered, assigned bus number 1 >Oct 29 11:35:34 unused kernel: uhci_hcd 0000:00:03.0: detected 2 ports >Oct 29 11:35:34 unused kernel: uhci_hcd 0000:00:03.0: irq 11, io base 0x0000c0a0 >Oct 29 11:35:34 unused kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001 >Oct 29 11:35:34 unused kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Oct 29 11:35:34 unused kernel: usb usb1: Product: UHCI Host Controller >Oct 29 11:35:34 unused kernel: usb usb1: Manufacturer: Linux 3.10.0-196.el7.x86_64 uhci_hcd >Oct 29 11:35:34 unused kernel: usb usb1: SerialNumber: 0000:00:03.0 >Oct 29 11:35:34 unused kernel: hub 1-0:1.0: USB hub found >Oct 29 11:35:34 unused kernel: hub 1-0:1.0: 2 ports detected >Oct 29 11:35:34 unused kernel: usbcore: registered new interface driver usbserial >Oct 29 11:35:34 unused kernel: usbcore: registered new interface driver usbserial_generic >Oct 29 11:35:34 unused kernel: usbserial: USB Serial support registered for generic >Oct 29 11:35:34 unused kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 >Oct 29 11:35:34 unused kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 >Oct 29 11:35:34 unused kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 >Oct 29 11:35:34 unused kernel: mousedev: PS/2 mouse device common for all mice >Oct 29 11:35:34 unused kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 >Oct 29 11:35:34 unused kernel: rtc_cmos 00:00: RTC can wake from S4 >Oct 29 11:35:34 unused kernel: rtc_cmos 00:00: rtc core: registered rtc_cmos as rtc0 >Oct 29 11:35:34 unused kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram >Oct 29 11:35:34 unused kernel: cpuidle: using governor menu >Oct 29 11:35:34 unused kernel: hidraw: raw HID events driver (C) Jiri Kosina >Oct 29 11:35:34 unused kernel: usbcore: registered new interface driver usbhid >Oct 29 11:35:34 unused kernel: usbhid: USB HID core driver >Oct 29 11:35:34 unused kernel: drop_monitor: Initializing network drop monitor service >Oct 29 11:35:34 unused kernel: TCP: cubic registered >Oct 29 11:35:34 unused kernel: Initializing XFRM netlink socket >Oct 29 11:35:34 unused kernel: NET: Registered protocol family 10 >Oct 29 11:35:34 unused kernel: NET: Registered protocol family 17 >Oct 29 11:35:34 unused kernel: Loading compiled-in X.509 certificates >Oct 29 11:35:34 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' >Oct 29 11:35:34 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' >Oct 29 11:35:34 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: 8c65d2217a39e9fa0bc841f8ba391e662cf68bcc' >Oct 29 11:35:34 unused kernel: registered taskstats version 1 >Oct 29 11:35:34 unused kernel: Key type trusted registered >Oct 29 11:35:34 unused kernel: Key type encrypted registered >Oct 29 11:35:34 unused kernel: IMA: No TPM chip found, activating TPM-bypass! >Oct 29 11:35:34 unused kernel: rtc_cmos 00:00: setting system clock to 2014-10-29 03:35:34 UTC (1414553734) >Oct 29 11:35:34 unused kernel: Freeing unused kernel memory: 1604k freed >Oct 29 11:35:34 unused systemd[1]: Unknown kernel switch systemd.debug. Ignoring. >Oct 29 11:35:34 unused systemd[1]: Supported kernel switches: >Oct 29 11:35:34 unused systemd[1]: systemd.unit=UNIT Default unit to start >Oct 29 11:35:34 unused systemd[1]: rd.systemd.unit=UNIT Default unit to start when run in initrd >Oct 29 11:35:34 unused systemd[1]: systemd.dump_core=0|1 Dump core on crash >Oct 29 11:35:34 unused systemd[1]: systemd.crash_shell=0|1 Run shell on crash >Oct 29 11:35:34 unused systemd[1]: systemd.crash_chvt=N Change to VT #N on crash >Oct 29 11:35:34 unused systemd[1]: systemd.confirm_spawn=0|1 Confirm every process spawn >Oct 29 11:35:34 unused systemd[1]: systemd.show_status=0|1 Show status updates on the console during bootup >Oct 29 11:35:34 unused systemd[1]: systemd.log_target=console|kmsg|journal|journal-or-kmsg|syslog|syslog-or-kmsg|null >Oct 29 11:35:34 unused systemd[1]: Log target >Oct 29 11:35:34 unused systemd[1]: systemd.log_level=LEVEL Log level >Oct 29 11:35:34 unused systemd[1]: systemd.log_color=0|1 Highlight important log messages >Oct 29 11:35:34 unused systemd[1]: systemd.log_location=0|1 Include code location in log messages >Oct 29 11:35:34 unused systemd[1]: systemd.default_standard_output=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 11:35:34 unused systemd[1]: Set default log output for services >Oct 29 11:35:34 unused systemd[1]: systemd.default_standard_error=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 11:35:34 unused systemd[1]: Set default log error output for services >Oct 29 11:35:34 unused systemd[1]: systemd.setenv=ASSIGNMENT Set an environment variable for all spawned processes >Oct 29 11:35:34 unused systemd[1]: systemd 208 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ) >Oct 29 11:35:34 unused systemd[1]: Detected virtualization 'kvm'. >Oct 29 11:35:34 unused systemd[1]: Running in initial RAM disk. >Oct 29 11:35:34 unused systemd[1]: Set hostname to <unused>. >Oct 29 11:35:34 unused systemd[1]: Expecting device dev-mapper-rhel_unused\x2droot.device... >Oct 29 11:35:34 unused systemd[1]: Starting -.slice. >Oct 29 11:35:34 unused systemd[1]: Created slice -.slice. >Oct 29 11:35:34 unused systemd[1]: Starting System Slice. >Oct 29 11:35:34 unused systemd[1]: Created slice System Slice. >Oct 29 11:35:34 unused systemd[1]: Starting Slices. >Oct 29 11:35:34 unused systemd[1]: Reached target Slices. >Oct 29 11:35:34 unused systemd[1]: Starting Timers. >Oct 29 11:35:34 unused systemd[1]: Reached target Timers. >Oct 29 11:35:34 unused systemd[1]: Starting Journal Socket. >Oct 29 11:35:34 unused systemd[1]: Listening on Journal Socket. >Oct 29 11:35:34 unused systemd[1]: Started dracut ask for additional cmdline parameters. >Oct 29 11:35:34 unused systemd[1]: Starting dracut cmdline hook... >Oct 29 11:35:34 unused systemd[1]: Started Load Kernel Modules. >Oct 29 11:35:34 unused systemd[1]: Starting Setup Virtual Console... >Oct 29 11:35:34 unused systemd[1]: Starting Journal Service... >Oct 29 11:35:34 unused systemd[1]: Started Journal Service. >Oct 29 11:35:34 unused journal: Journal started >Oct 29 11:35:34 unused systemd: Starting udev Kernel Socket. >Oct 29 11:35:34 unused systemd: Listening on udev Kernel Socket. >Oct 29 11:35:34 unused systemd: Starting udev Control Socket. >Oct 29 11:35:34 unused systemd: Listening on udev Control Socket. >Oct 29 11:35:34 unused systemd: Starting Sockets. >Oct 29 11:35:34 unused systemd: Reached target Sockets. >Oct 29 11:35:34 unused systemd: Starting Create list of required static device nodes for the current kernel... >Oct 29 11:35:34 unused systemd: Starting Apply Kernel Variables... >Oct 29 11:35:34 unused systemd: Starting Swap. >Oct 29 11:35:34 unused systemd: Reached target Swap. >Oct 29 11:35:34 unused systemd: Starting Local File Systems. >Oct 29 11:35:34 unused systemd: Reached target Local File Systems. >Oct 29 11:35:34 unused systemd: Started Apply Kernel Variables. >Oct 29 11:35:34 unused systemd: Started Create list of required static device nodes for the current kernel. >Oct 29 11:35:34 unused systemd: Starting Create static device nodes in /dev... >Oct 29 11:35:34 unused dracut-cmdline: dracut-7.1 (Maipo) dracut-033-224.el7 >Oct 29 11:35:34 unused dracut-cmdline: Using kernel command line parameters: >Oct 29 11:35:34 unused systemd: Started Create static device nodes in /dev. >Oct 29 11:35:34 unused systemd: Started Setup Virtual Console. >Oct 29 11:35:34 unused systemd: Started dracut cmdline hook. >Oct 29 11:35:34 unused systemd: Starting dracut pre-udev hook... >Oct 29 11:35:34 unused kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd >Oct 29 11:35:34 unused kernel: device-mapper: uevent: version 1.0.3 >Oct 29 11:35:34 unused kernel: device-mapper: ioctl: 4.27.0-ioctl (2013-10-30) initialised: dm-devel@redhat.com >Oct 29 11:35:34 unused systemd: Started dracut pre-udev hook. >Oct 29 11:35:34 unused systemd: Starting udev Kernel Device Manager... >Oct 29 11:35:34 unused systemd-udevd[260]: starting version 208 >Oct 29 11:35:34 unused systemd: Started udev Kernel Device Manager. >Oct 29 11:35:34 unused systemd: Started dracut pre-trigger hook. >Oct 29 11:35:34 unused systemd: Starting udev Coldplug all Devices... >Oct 29 11:35:34 unused systemd: Mounting Configuration File System... >Oct 29 11:35:34 unused kernel: e1000: Intel(R) PRO/1000 Network Driver - version 7.3.21-k8-NAPI >Oct 29 11:35:34 unused kernel: e1000: Copyright (c) 1999-2006 Intel Corporation. >Oct 29 11:35:34 unused systemd: Started udev Coldplug all Devices. >Oct 29 11:35:34 unused systemd: Starting dracut initqueue hook... >Oct 29 11:35:34 unused systemd: Starting Show Plymouth Boot Screen... >Oct 29 11:35:34 unused kernel: scsi host0: ata_piix >Oct 29 11:35:34 unused kernel: scsi host1: ata_piix >Oct 29 11:35:34 unused kernel: FDC 0 is a S82078B >Oct 29 11:35:34 unused kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 >Oct 29 11:35:34 unused kernel: [drm] Initialized drm 1.1.0 20060810 >Oct 29 11:35:34 unused kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 >Oct 29 11:35:34 unused systemd: Mounted Configuration File System. >Oct 29 11:35:34 unused systemd: Starting System Initialization. >Oct 29 11:35:34 unused systemd: Reached target System Initialization. >Oct 29 11:35:34 unused systemd: Started Show Plymouth Boot Screen. >Oct 29 11:35:34 unused systemd: Started Dispatch Password Requests to Console Directory Watch. >Oct 29 11:35:34 unused systemd: Starting Paths. >Oct 29 11:35:34 unused systemd: Reached target Paths. >Oct 29 11:35:34 unused systemd: Starting Forward Password Requests to Plymouth Directory Watch. >Oct 29 11:35:34 unused systemd: Started Forward Password Requests to Plymouth Directory Watch. >Oct 29 11:35:34 unused systemd: Starting Basic System. >Oct 29 11:35:34 unused systemd: Reached target Basic System. >Oct 29 11:35:34 unused kernel: ACPI: PCI Interrupt Link [LNKA] enabled at IRQ 10 >Oct 29 11:35:34 unused kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001 >Oct 29 11:35:34 unused kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=5 >Oct 29 11:35:34 unused kernel: usb 1-1: Product: QEMU USB Tablet >Oct 29 11:35:34 unused kernel: usb 1-1: Manufacturer: QEMU >Oct 29 11:35:34 unused kernel: usb 1-1: SerialNumber: 42 >Oct 29 11:35:34 unused kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:03.0/usb1/1-1/1-1:1.0/input/input2 >Oct 29 11:35:34 unused kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Pointer [QEMU QEMU USB Tablet] on usb-0000:00:03.0-1/input0 >Oct 29 11:35:35 unused kernel: e1000 0000:00:05.0 eth0: (PCI:33MHz:32-bit) 9a:4e:4f:50:51:52 >Oct 29 11:35:35 unused kernel: e1000 0000:00:05.0 eth0: Intel(R) PRO/1000 Network Connection >Oct 29 11:35:35 unused kernel: ACPI: PCI Interrupt Link [LNKD] enabled at IRQ 11 >Oct 29 11:35:35 unused kernel: scsi host2: Virtio SCSI HBA >Oct 29 11:35:35 unused kernel: scsi 2:0:0:0: Direct-Access QEMU QEMU HARDDISK 2.1. PQ: 0 ANSI: 5 >Oct 29 11:35:35 unused kernel: scsi 2:0:1:0: CD-ROM QEMU QEMU CD-ROM 2.1. PQ: 0 ANSI: 5 >Oct 29 11:35:35 unused kernel: sr 2:0:1:0: [sr0] scsi3-mmc drive: 16x/50x cd/rw xa/form2 cdda tray >Oct 29 11:35:35 unused kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 >Oct 29 11:35:35 unused systemd-udevd[262]: renamed network interface eth0 to ens5 >Oct 29 11:35:35 unused kernel: ACPI: PCI Interrupt Link [LNKB] enabled at IRQ 10 >Oct 29 11:35:35 unused kernel: sd 2:0:0:0: [sda] 41943040 512-byte logical blocks: (21.4 GB/20.0 GiB) >Oct 29 11:35:35 unused kernel: sd 2:0:0:0: [sda] Write Protect is off >Oct 29 11:35:35 unused kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA >Oct 29 11:35:35 unused kernel: sda: sda1 sda2 >Oct 29 11:35:35 unused kernel: sd 2:0:0:0: [sda] Attached SCSI disk >Oct 29 11:35:35 unused kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 >Oct 29 11:35:35 unused kernel: [drm] Device Version 0.0 >Oct 29 11:35:35 unused kernel: [drm] Compression level 0 log level 0 >Oct 29 11:35:35 unused kernel: [drm] Currently using mode #0, list at 0x488 >Oct 29 11:35:35 unused kernel: [drm] 12286 io pages at offset 0x1000000 >Oct 29 11:35:35 unused kernel: [drm] 16777216 byte draw area at offset 0x0 >Oct 29 11:35:35 unused kernel: [drm] RAM header offset: 0x3ffe000 >Oct 29 11:35:35 unused kernel: [drm] rom modes offset 0x488 for 128 modes >Oct 29 11:35:35 unused kernel: [TTM] Zone kernel: Available graphics memory: 1941456 kiB >Oct 29 11:35:35 unused kernel: [TTM] Initializing pool allocator >Oct 29 11:35:35 unused kernel: [TTM] Initializing DMA pool allocator >Oct 29 11:35:35 unused kernel: tsc: Refined TSC clocksource calibration: 2000.003 MHz >Oct 29 11:35:35 unused kernel: [drm] qxl: 16M of VRAM memory size >Oct 29 11:35:35 unused kernel: [drm] qxl: 63M of IO pages memory ready (VRAM domain) >Oct 29 11:35:35 unused kernel: [drm] qxl: 32M of Surface memory size >Oct 29 11:35:35 unused kernel: [drm] main mem slot 1 [f8000000,3ffe000] >Oct 29 11:35:35 unused kernel: [drm] surface mem slot 2 [fc000000,2000000] >Oct 29 11:35:35 unused kernel: [drm] fb mappable at 0xF8000000, size 3145728 >Oct 29 11:35:35 unused kernel: [drm] fb: depth 24, pitch 4096, width 1024, height 768 >Oct 29 11:35:35 unused kernel: fbcon: qxldrmfb (fb0) is primary device >Oct 29 11:35:35 unused kernel: Console: switching to colour frame buffer device 128x48 >Oct 29 11:35:35 unused kernel: qxl 0000:00:02.0: fb0: qxldrmfb frame buffer device >Oct 29 11:35:35 unused kernel: qxl 0000:00:02.0: registered panic notifier >Oct 29 11:35:35 unused kernel: [drm] Initialized qxl 0.1.0 20120117 for 0000:00:02.0 on minor 0 >Oct 29 11:35:35 unused dracut-initqueue: Scanning devices sda2 for LVM logical volumes rhel_unused/root rhel_unused/swap >Oct 29 11:35:35 unused dracut-initqueue: inactive '/dev/rhel_unused/swap' [2.00 GiB] inherit >Oct 29 11:35:35 unused dracut-initqueue: inactive '/dev/rhel_unused/root' [17.47 GiB] inherit >Oct 29 11:35:35 unused systemd: Found device /dev/mapper/rhel_unused-root. >Oct 29 11:35:35 unused systemd: Starting File System Check on /dev/mapper/rhel_unused-root... >Oct 29 11:35:35 unused systemd-fsck: /sbin/fsck.xfs: XFS file system. >Oct 29 11:35:35 unused systemd: Started File System Check on /dev/mapper/rhel_unused-root. >Oct 29 11:35:35 unused systemd: Started dracut initqueue hook. >Oct 29 11:35:35 unused systemd: Started dracut pre-mount hook. >Oct 29 11:35:35 unused systemd: Mounting /sysroot... >Oct 29 11:35:35 unused systemd: Starting Remote File Systems (Pre). >Oct 29 11:35:35 unused systemd: Reached target Remote File Systems (Pre). >Oct 29 11:35:35 unused systemd: Starting Remote File Systems. >Oct 29 11:35:35 unused systemd: Reached target Remote File Systems. >Oct 29 11:35:35 unused kernel: SGI XFS with ACLs, security attributes, large block/inode numbers, no debug enabled >Oct 29 11:35:35 unused kernel: XFS (dm-0): Mounting V4 Filesystem >Oct 29 11:35:35 unused kernel: XFS (dm-0): Ending clean mount >Oct 29 11:35:35 unused systemd: Mounted /sysroot. >Oct 29 11:35:35 unused systemd: Starting Initrd Root File System. >Oct 29 11:35:35 unused systemd: Reached target Initrd Root File System. >Oct 29 11:35:35 unused systemd: Starting Reload Configuration from the Real Root... >Oct 29 11:35:35 unused systemd: Reloading. >Oct 29 11:35:35 unused systemd: Started Reload Configuration from the Real Root. >Oct 29 11:35:35 unused systemd: Starting Initrd File Systems. >Oct 29 11:35:35 unused systemd: Reached target Initrd File Systems. >Oct 29 11:35:35 unused systemd: Started dracut mount hook. >Oct 29 11:35:35 unused systemd: Starting Initrd Default Target. >Oct 29 11:35:35 unused systemd: Reached target Initrd Default Target. >Oct 29 11:35:35 unused systemd: Starting dracut pre-pivot and cleanup hook... >Oct 29 11:35:35 unused systemd: Started dracut pre-pivot and cleanup hook. >Oct 29 11:35:35 unused systemd: Starting Cleaning Up and Shutting Down Daemons... >Oct 29 11:35:35 unused systemd: Stopping Cleaning Up and Shutting Down Daemons... >Oct 29 11:35:35 unused systemd: Starting Plymouth switch root service... >Oct 29 11:35:35 unused systemd: Stopped Cleaning Up and Shutting Down Daemons. >Oct 29 11:35:35 unused systemd: Stopping dracut pre-pivot and cleanup hook... >Oct 29 11:35:35 unused systemd: Stopped dracut pre-pivot and cleanup hook. >Oct 29 11:35:35 unused systemd: Stopping Remote File Systems. >Oct 29 11:35:35 unused systemd: Stopped target Remote File Systems. >Oct 29 11:35:35 unused systemd: Stopping Remote File Systems (Pre). >Oct 29 11:35:35 unused systemd: Stopped target Remote File Systems (Pre). >Oct 29 11:35:35 unused systemd: Stopping dracut initqueue hook... >Oct 29 11:35:35 unused systemd: Stopped dracut initqueue hook. >Oct 29 11:35:35 unused systemd: Stopping Initrd Default Target. >Oct 29 11:35:35 unused systemd: Stopped target Initrd Default Target. >Oct 29 11:35:35 unused systemd: Stopping Basic System. >Oct 29 11:35:35 unused systemd: Stopped target Basic System. >Oct 29 11:35:35 unused systemd: Stopping Slices. >Oct 29 11:35:35 unused systemd: Stopped target Slices. >Oct 29 11:35:35 unused systemd: Stopping Paths. >Oct 29 11:35:35 unused systemd: Stopped target Paths. >Oct 29 11:35:35 unused systemd: Stopping Timers. >Oct 29 11:35:35 unused systemd: Stopped target Timers. >Oct 29 11:35:35 unused systemd: Stopping Sockets. >Oct 29 11:35:35 unused systemd: Stopped target Sockets. >Oct 29 11:35:35 unused systemd: Stopping System Initialization. >Oct 29 11:35:35 unused systemd: Stopped target System Initialization. >Oct 29 11:35:35 unused systemd: Stopping Apply Kernel Variables... >Oct 29 11:35:35 unused systemd: Stopped Apply Kernel Variables. >Oct 29 11:35:35 unused systemd: Stopping udev Coldplug all Devices... >Oct 29 11:35:35 unused systemd: Stopped udev Coldplug all Devices. >Oct 29 11:35:35 unused systemd: Stopping Swap. >Oct 29 11:35:35 unused systemd: Stopped target Swap. >Oct 29 11:35:35 unused systemd: Stopping Local File Systems. >Oct 29 11:35:35 unused systemd: Stopped target Local File Systems. >Oct 29 11:35:35 unused systemd: Stopping udev Kernel Device Manager... >Oct 29 11:35:35 unused systemd: Stopped udev Kernel Device Manager. >Oct 29 11:35:35 unused systemd: Stopping dracut pre-udev hook... >Oct 29 11:35:35 unused systemd: Stopped dracut pre-udev hook. >Oct 29 11:35:35 unused systemd: Stopping dracut cmdline hook... >Oct 29 11:35:35 unused systemd: Stopped dracut cmdline hook. >Oct 29 11:35:35 unused systemd: Stopping Create static device nodes in /dev... >Oct 29 11:35:35 unused systemd: Stopped Create static device nodes in /dev. >Oct 29 11:35:35 unused systemd: Stopping Create list of required static device nodes for the current kernel... >Oct 29 11:35:35 unused systemd: Stopped Create list of required static device nodes for the current kernel. >Oct 29 11:35:35 unused systemd: Stopping udev Kernel Socket. >Oct 29 11:35:35 unused systemd: Closed udev Kernel Socket. >Oct 29 11:35:35 unused systemd: Stopping udev Control Socket. >Oct 29 11:35:35 unused systemd: Closed udev Control Socket. >Oct 29 11:35:35 unused systemd: Starting Cleanup udevd DB... >Oct 29 11:35:35 unused systemd: Started Cleanup udevd DB. >Oct 29 11:35:35 unused systemd: Starting Switch Root. >Oct 29 11:35:35 unused systemd: Reached target Switch Root. >Oct 29 11:35:35 unused systemd: Started Plymouth switch root service. >Oct 29 11:35:35 unused systemd: Starting Switch Root... >Oct 29 11:35:35 unused systemd: Switching root. >Oct 29 11:35:35 unused journal: Journal stopped >Oct 29 11:35:39 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:35:39 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:35:39 unused systemd-journald[111]: Received SIGTERM >Oct 29 11:35:39 unused systemd-cgroups-agent[464]: Failed to get D-Bus connection: Unknown error -1 >Oct 29 11:35:39 unused kernel: type=1404 audit(1414553736.531:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 >Oct 29 11:35:39 unused kernel: type=1403 audit(1414553736.777:3): policy loaded auid=4294967295 ses=4294967295 >Oct 29 11:35:39 unused systemd[1]: Successfully loaded SELinux policy in 281.706ms. >Oct 29 11:35:39 unused systemd[1]: Relabelled /dev and /run in 21.048ms. >Oct 29 11:35:39 unused systemd[1]: Unknown kernel switch systemd.debug. Ignoring. >Oct 29 11:35:39 unused systemd[1]: Supported kernel switches: >Oct 29 11:35:39 unused systemd[1]: systemd.unit=UNIT Default unit to start >Oct 29 11:35:39 unused systemd[1]: rd.systemd.unit=UNIT Default unit to start when run in initrd >Oct 29 11:35:39 unused systemd[1]: systemd.dump_core=0|1 Dump core on crash >Oct 29 11:35:39 unused systemd[1]: systemd.crash_shell=0|1 Run shell on crash >Oct 29 11:35:39 unused systemd[1]: systemd.crash_chvt=N Change to VT #N on crash >Oct 29 11:35:39 unused systemd[1]: systemd.confirm_spawn=0|1 Confirm every process spawn >Oct 29 11:35:39 unused systemd[1]: systemd.show_status=0|1 Show status updates on the console during bootup >Oct 29 11:35:39 unused systemd[1]: systemd.log_target=console|kmsg|journal|journal-or-kmsg|syslog|syslog-or-kmsg|null >Oct 29 11:35:39 unused systemd[1]: Log target >Oct 29 11:35:39 unused systemd[1]: systemd.log_level=LEVEL Log level >Oct 29 11:35:39 unused systemd[1]: systemd.log_color=0|1 Highlight important log messages >Oct 29 11:35:39 unused systemd[1]: systemd.log_location=0|1 Include code location in log messages >Oct 29 11:35:39 unused systemd[1]: systemd.default_standard_output=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 11:35:39 unused systemd[1]: Set default log output for services >Oct 29 11:35:39 unused systemd[1]: systemd.default_standard_error=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 11:35:39 unused systemd[1]: Set default log error output for services >Oct 29 11:35:39 unused systemd[1]: systemd.setenv=ASSIGNMENT Set an environment variable for all spawned processes >Oct 29 11:35:39 unused journal: Journal started >Oct 29 11:35:39 unused systemd: systemd 208 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ) >Oct 29 11:35:39 unused systemd: Detected virtualization 'kvm'. >Oct 29 11:35:39 unused systemd: Set hostname to <unused>. >Oct 29 11:35:39 unused systemd: /usr/lib/systemd/system-generators/anaconda-generator exited with exit status 1. >Oct 29 11:35:39 unused systemd: [/usr/lib/systemd/system/lvm2-lvmetad.socket:9] Unknown lvalue 'RemoveOnStop' in section 'Socket' >Oct 29 11:35:39 unused systemd: [/usr/lib/systemd/system/dm-event.socket:10] Unknown lvalue 'RemoveOnStop' in section 'Socket' >Oct 29 11:35:39 unused systemd: Starting LVM2 metadata daemon... >Oct 29 11:35:39 unused systemd: Started LVM2 metadata daemon. >Oct 29 11:35:40 unused systemd: Started Load/Save Random Seed. >Oct 29 11:35:40 unused lvm: 2 logical volume(s) in volume group "rhel_unused" monitored >Oct 29 11:35:40 unused systemd: Started Configure read-only root support. >Oct 29 11:35:40 unused systemd: Started Import network configuration from initramfs. >Oct 29 11:35:40 unused systemd: Started Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. >Oct 29 11:35:40 unused systemd: Started Create static device nodes in /dev. >Oct 29 11:35:40 unused systemd: Starting udev Kernel Device Manager... >Oct 29 11:35:40 unused systemd: Starting Local File Systems (Pre). >Oct 29 11:35:40 unused systemd: Reached target Local File Systems (Pre). >Oct 29 11:35:40 unused systemd: Started udev Kernel Device Manager. >Oct 29 11:35:40 unused systemd-udevd[533]: starting version 208 >Oct 29 11:35:40 unused systemd: Started udev Wait for Complete Device Initialization. >Oct 29 11:35:40 unused systemd: Starting Activation of DM RAID sets... >Oct 29 11:35:40 unused systemd: Found device /dev/ttyS0. >Oct 29 11:35:40 unused kernel: input: PC Speaker as /devices/platform/pcspkr/input/input4 >Oct 29 11:35:41 unused kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 >Oct 29 11:35:41 unused kernel: ppdev: user-space parallel port driver >Oct 29 11:35:41 unused systemd: Started Activation of DM RAID sets. >Oct 29 11:35:41 unused systemd: Starting Encrypted Volumes. >Oct 29 11:35:41 unused systemd: Reached target Encrypted Volumes. >Oct 29 11:35:41 unused mtp-probe: checking bus 1, device 2: "/sys/devices/pci0000:00/0000:00:03.0/usb1/1-1" >Oct 29 11:35:41 unused mtp-probe: bus: 1, device: 2 was not an MTP device >Oct 29 11:35:41 unused kernel: alg: No test for __gcm-aes-aesni (__driver-gcm-aes-aesni) >Oct 29 11:35:41 unused kernel: alg: No test for crc32 (crc32-pclmul) >Oct 29 11:35:41 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 29 11:35:41 unused systemd: Starting LVM2 PV scan on device 8:2... >Oct 29 11:35:41 unused lvm: 2 logical volume(s) in volume group "rhel_unused" now active >Oct 29 11:35:41 unused systemd: Found device /dev/mapper/rhel_unused-swap. >Oct 29 11:35:41 unused systemd: Activating swap /dev/mapper/rhel_unused-swap... >Oct 29 11:35:41 unused systemd: Found device QEMU_HARDDISK. >Oct 29 11:35:41 unused systemd: Mounting /boot... >Oct 29 11:35:41 unused systemd: Started LVM2 PV scan on device 8:2. >Oct 29 11:35:41 unused systemd: Activated swap /dev/mapper/rhel_unused-swap. >Oct 29 11:35:41 unused kernel: XFS (sda1): Mounting V4 Filesystem >Oct 29 11:35:41 unused kernel: Adding 2097148k swap on /dev/mapper/rhel_unused-swap. Priority:-1 extents:1 across:2097148k FS >Oct 29 11:35:41 unused systemd: Starting Swap. >Oct 29 11:35:41 unused systemd: Reached target Swap. >Oct 29 11:35:47 unused kernel: XFS (sda1): Ending clean mount >Oct 29 11:35:47 unused systemd: Mounted /boot. >Oct 29 11:35:47 unused systemd: Starting Local File Systems. >Oct 29 11:35:47 unused systemd: Reached target Local File Systems. >Oct 29 11:35:47 unused systemd: Started Mark the need to relabel after reboot. >Oct 29 11:35:47 unused systemd: Started Relabel all filesystems, if necessary. >Oct 29 11:35:47 unused systemd: Started Reconfigure the system on administrator request. >Oct 29 11:35:47 unused systemd: Starting Create Volatile Files and Directories... >Oct 29 11:35:47 unused systemd: Starting Tell Plymouth To Write Out Runtime Data... >Oct 29 11:35:47 unused systemd: Started Create Volatile Files and Directories. >Oct 29 11:35:47 unused systemd: Starting Security Auditing Service... >Oct 29 11:35:48 unused augenrules: /sbin/augenrules: No change >Oct 29 11:35:48 unused auditd[618]: Started dispatcher: /sbin/audispd pid: 629 >Oct 29 11:35:48 unused kernel: type=1305 audit(1414553748.138:4): audit_pid=618 old=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 >Oct 29 11:35:48 unused audispd: audispd initialized with q_depth=150 and 1 active plugins >Oct 29 11:35:48 unused auditd[618]: Init complete, auditd 2.4 listening for events (startup state enable) >Oct 29 11:35:48 unused augenrules: No rules >Oct 29 11:35:48 unused augenrules: enabled 1 >Oct 29 11:35:48 unused augenrules: flag 1 >Oct 29 11:35:48 unused augenrules: pid 618 >Oct 29 11:35:48 unused augenrules: rate_limit 0 >Oct 29 11:35:48 unused augenrules: backlog_limit 320 >Oct 29 11:35:48 unused augenrules: lost 0 >Oct 29 11:35:48 unused augenrules: backlog 1 >Oct 29 11:35:48 unused systemd: Started Security Auditing Service. >Oct 29 11:35:48 unused systemd: Starting Update UTMP about System Reboot/Shutdown... >Oct 29 11:35:48 unused systemd: Started Update UTMP about System Reboot/Shutdown. >Oct 29 11:35:48 unused systemd: Started Tell Plymouth To Write Out Runtime Data. >Oct 29 11:35:48 unused systemd: Starting System Initialization. >Oct 29 11:35:48 unused systemd: Reached target System Initialization. >Oct 29 11:35:48 unused systemd: Starting Daily Cleanup of Temporary Directories. >Oct 29 11:35:48 unused systemd: Started Daily Cleanup of Temporary Directories. >Oct 29 11:35:48 unused systemd: Starting Timers. >Oct 29 11:35:48 unused systemd: Reached target Timers. >Oct 29 11:35:48 unused systemd: Starting Open-iSCSI iscsid Socket. >Oct 29 11:35:48 unused systemd: Listening on Open-iSCSI iscsid Socket. >Oct 29 11:35:48 unused systemd: Starting Open-iSCSI iscsiuio Socket. >Oct 29 11:35:48 unused systemd: Listening on Open-iSCSI iscsiuio Socket. >Oct 29 11:35:48 unused systemd: Starting RPCbind Server Activation Socket. >Oct 29 11:35:48 unused systemd: Listening on RPCbind Server Activation Socket. >Oct 29 11:35:48 unused systemd: Starting Avahi mDNS/DNS-SD Stack Activation Socket. >Oct 29 11:35:48 unused systemd: Listening on Avahi mDNS/DNS-SD Stack Activation Socket. >Oct 29 11:35:48 unused systemd: Starting Flexible branding. >Oct 29 11:35:48 unused systemd: Started Flexible branding. >Oct 29 11:35:48 unused systemd: Starting Paths. >Oct 29 11:35:48 unused systemd: Reached target Paths. >Oct 29 11:35:48 unused systemd: Starting D-Bus System Message Bus Socket. >Oct 29 11:35:48 unused systemd: Listening on D-Bus System Message Bus Socket. >Oct 29 11:35:48 unused systemd: Starting Sockets. >Oct 29 11:35:48 unused systemd: Reached target Sockets. >Oct 29 11:35:48 unused systemd: Starting Basic System. >Oct 29 11:35:48 unused systemd: Reached target Basic System. >Oct 29 11:35:48 unused systemd: Starting firewalld - dynamic firewall daemon... >Oct 29 11:35:48 unused systemd: Started Load CPU microcode update. >Oct 29 11:35:48 unused systemd: Starting Dump dmesg to /var/log/dmesg... >Oct 29 11:35:48 unused systemd: Started Software RAID monitoring and management. >Oct 29 11:35:48 unused systemd: Starting libstoragemgmt plug-in server daemon... >Oct 29 11:35:49 unused systemd: Started libstoragemgmt plug-in server daemon. >Oct 29 11:35:49 unused systemd: Starting Avahi mDNS/DNS-SD Stack... >Oct 29 11:35:49 unused systemd: Starting NTP client/server... >Oct 29 11:35:49 unused systemd: Starting Kernel Samepage Merging... >Oct 29 11:35:49 unused systemd: Starting Rollback uncommitted netcf network config change transactions... >Oct 29 11:35:49 unused systemd: Starting System Logging Service... >Oct 29 11:35:49 unused netcf-transaction.sh: Running start: No pending transaction to rollback >Oct 29 11:35:49 unused systemd: Starting Resets System Activity Logs... >Oct 29 11:35:49 unused systemd: Starting Self Monitoring and Reporting Technology (SMART) Daemon... >Oct 29 11:35:49 unused avahi-daemon[648]: Found user 'avahi' (UID 70) and group 'avahi' (GID 70). >Oct 29 11:35:49 unused avahi-daemon[648]: Successfully dropped root privileges. >Oct 29 11:35:49 unused avahi-daemon[648]: avahi-daemon 0.6.31 starting up. >Oct 29 11:35:49 unused avahi-daemon[648]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns! >Oct 29 11:35:49 unused systemd: Started Self Monitoring and Reporting Technology (SMART) Daemon. >Oct 29 11:35:49 unused systemd: Starting Dynamic System Tuning Daemon... >Oct 29 11:35:49 unused chronyd[662]: chronyd version 1.29.1 starting >Oct 29 11:35:49 unused systemd: Starting Hardware RNG Entropy Gatherer Daemon... >Oct 29 11:35:49 unused chronyd[662]: Linux kernel major=3 minor=10 patch=0 >Oct 29 11:35:49 unused chronyd[662]: hz=100 shift_hz=7 freq_scale=1.00000000 nominal_tick=10000 slew_delta_tick=833 max_tick_bias=1000 shift_pll=2 >Oct 29 11:35:49 unused rngd: Unable to open file: /dev/tpm0 >Oct 29 11:35:49 unused rngd: can't open any entropy source >Oct 29 11:35:49 unused rngd: Maybe RNG device modules are not loaded >Oct 29 11:35:49 unused systemd: Started Hardware RNG Entropy Gatherer Daemon. >Oct 29 11:35:49 unused systemd: Started OpenSSH Server Key Generation. >Oct 29 11:35:49 unused systemd: Starting irqbalance daemon... >Oct 29 11:35:49 unused smartd[657]: smartd 6.2 2013-07-26 r3841 [x86_64-linux-3.10.0-196.el7.x86_64] (local build) >Oct 29 11:35:49 unused smartd[657]: Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org >Oct 29 11:35:49 unused smartd[657]: Opened configuration file /etc/smartmontools/smartd.conf >Oct 29 11:35:49 unused chronyd[662]: Frequency 0.597 +/- 4.186 ppm read from /var/lib/chrony/drift >Oct 29 11:35:49 unused smartd[657]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices >Oct 29 11:35:49 unused smartd[657]: Device: /dev/sda, opened >Oct 29 11:35:49 unused smartd[657]: Device: /dev/sda, [QEMU QEMU HARDDISK 2.1.], 21.4 GB >Oct 29 11:35:49 unused systemd: Started irqbalance daemon. >Oct 29 11:35:49 unused systemd: Starting Login Service... >Oct 29 11:35:49 unused systemd: Starting Accounts Service... >Oct 29 11:35:49 unused smartd[657]: Device: /dev/sda, Bad IEC (SMART) mode page, err=5, skip device >Oct 29 11:35:49 unused smartd[657]: Monitoring 0 ATA and 0 SCSI devices >Oct 29 11:35:49 unused systemd: Starting RealtimeKit Scheduling Policy Service... >Oct 29 11:35:49 unused systemd: Starting D-Bus System Message Bus... >Oct 29 11:35:50 unused systemd: Started D-Bus System Message Bus. >Oct 29 11:35:50 unused systemd: Started Dump dmesg to /var/log/dmesg. >Oct 29 11:35:50 unused systemd: Started Kernel Samepage Merging. >Oct 29 11:35:50 unused systemd: Started Rollback uncommitted netcf network config change transactions. >Oct 29 11:35:50 unused systemd: Started Resets System Activity Logs. >Oct 29 11:35:50 unused systemd: rngd.service: main process exited, code=exited, status=1/FAILURE >Oct 29 11:35:50 unused systemd: Unit rngd.service entered failed state. >Oct 29 11:35:50 unused systemd: Starting Kernel Samepage Merging (KSM) Tuning Daemon... >Oct 29 11:35:50 unused systemd: Started System Logging Service. >Oct 29 11:35:50 unused systemd: Started Kernel Samepage Merging (KSM) Tuning Daemon. >Oct 29 11:35:50 unused systemd: Started NTP client/server. >Oct 29 11:35:51 unused dbus-daemon: dbus[677]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:35:51 unused dbus[677]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 11:35:51 unused avahi-daemon[648]: Successfully called chroot(). >Oct 29 11:35:51 unused avahi-daemon[648]: Successfully dropped remaining capabilities. >Oct 29 11:35:51 unused avahi-daemon[648]: No service file found in /etc/avahi/services. >Oct 29 11:35:51 unused systemd: Started Avahi mDNS/DNS-SD Stack. >Oct 29 11:35:51 unused avahi-daemon[648]: Network interface enumeration completed. >Oct 29 11:35:51 unused avahi-daemon[648]: Registering HINFO record with values 'X86_64'/'LINUX'. >Oct 29 11:35:51 unused avahi-daemon[648]: Server startup complete. Host name is unused.local. Local service cookie is 1168041776. >Oct 29 11:35:51 unused systemd: Started RealtimeKit Scheduling Policy Service. >Oct 29 11:35:51 unused systemd-logind: New seat seat0. >Oct 29 11:35:51 unused systemd: Started Login Service. >Oct 29 11:35:51 unused systemd-logind: Watching system buttons on /dev/input/event0 (Power Button) >Oct 29 11:35:52 unused dbus-daemon: dbus[677]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Oct 29 11:35:52 unused dbus[677]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Oct 29 11:35:52 unused systemd: Starting Authorization Manager... >Oct 29 11:35:52 unused polkitd[710]: Started polkitd version 0.112 >Oct 29 11:35:53 unused dbus-daemon: dbus[677]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Oct 29 11:35:53 unused dbus[677]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Oct 29 11:35:53 unused systemd: Started Authorization Manager. >Oct 29 11:35:53 unused accounts-daemon[670]: started daemon version 0.6.35 >Oct 29 11:35:53 unused systemd: Started Accounts Service. >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused kernel: ip_tables: (C) 2000-2006 Netfilter Core Team >Oct 29 11:35:53 unused systemd: Started Dynamic System Tuning Daemon. >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused kernel: nf_conntrack version 0.5.0 (16384 buckets, 65536 max) >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused audispd: queue is full - dropping event >Oct 29 11:35:53 unused kernel: Ebtables v2.0 registered >Oct 29 11:35:53 unused kernel: Bridge firewalling registered >Oct 29 11:35:54 unused systemd: Started firewalld - dynamic firewall daemon. >Oct 29 11:35:54 unused systemd: Starting Network Manager... >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused NetworkManager[791]: <info> NetworkManager (version 0.9.9.1-42.git20140326.4dba720.el7) is starting... >Oct 29 11:35:54 unused NetworkManager[791]: <info> Read config: /etc/NetworkManager/NetworkManager.conf and conf.d: 10-ibft-plugin.conf, 00-server.conf >Oct 29 11:35:54 unused NetworkManager[791]: <info> WEXT support is disabled >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused kernel: cfg80211: Calling CRDA to update world regulatory domain >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused NetworkManager[791]: <info> VPN: loaded org.freedesktop.NetworkManager.libreswan >Oct 29 11:35:54 unused kernel: cfg80211: World regulatory domain updated: >Oct 29 11:35:54 unused kernel: cfg80211: DFS Master region: unset >Oct 29 11:35:54 unused kernel: cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time) >Oct 29 11:35:54 unused kernel: cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:35:54 unused kernel: cfg80211: (2457000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused kernel: cfg80211: (2474000 KHz - 2494000 KHz @ 20000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:35:54 unused kernel: cfg80211: (5170000 KHz - 5250000 KHz @ 160000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:35:54 unused kernel: cfg80211: (5250000 KHz - 5330000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s) >Oct 29 11:35:54 unused kernel: cfg80211: (5490000 KHz - 5730000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s) >Oct 29 11:35:54 unused kernel: cfg80211: (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 11:35:54 unused kernel: cfg80211: (57240000 KHz - 63720000 KHz @ 2160000 KHz), (N/A, 0 mBm), (N/A) >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused NetworkManager[791]: ifcfg-rh: Acquired D-Bus service com.redhat.ifcfgrh1 >Oct 29 11:35:54 unused NetworkManager[791]: <info> Loaded plugin ifcfg-rh: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused NetworkManager[791]: <info> Loaded plugin iBFT: (c) 2014 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 11:35:54 unused NetworkManager[791]: <info> Loaded plugin keyfile: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused NetworkManager[791]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:35:54 unused NetworkManager[791]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-ens5 ... >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused NetworkManager[791]: ifcfg-rh: read connection 'ens5' >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused NetworkManager[791]: <info> monitoring kernel firmware directory '/lib/firmware'. >Oct 29 11:35:54 unused NetworkManager[791]: <info> WiFi hardware radio set enabled >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused NetworkManager[791]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-adsl.so >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:54 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused NetworkManager[791]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-bluetooth.so >Oct 29 11:35:55 unused NetworkManager[791]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-wwan.so >Oct 29 11:35:55 unused NetworkManager[791]: <info> WiFi enabled by radio killswitch; enabled by state file >Oct 29 11:35:55 unused NetworkManager[791]: <info> WWAN enabled by radio killswitch; enabled by state file >Oct 29 11:35:55 unused NetworkManager[791]: <info> WiMAX enabled by radio killswitch; enabled by state file >Oct 29 11:35:55 unused NetworkManager[791]: <info> Networking is enabled by state file >Oct 29 11:35:55 unused NetworkManager[791]: <info> (lo): link connected >Oct 29 11:35:55 unused NetworkManager[791]: <info> (lo): carrier is ON (but ignored) >Oct 29 11:35:55 unused NetworkManager[791]: <info> (lo): new Generic device (driver: 'unknown' ifindex: 1) >Oct 29 11:35:55 unused NetworkManager[791]: <info> (lo): exported as /org/freedesktop/NetworkManager/Devices/0 >Oct 29 11:35:55 unused NetworkManager[791]: <info> (ens5): carrier is OFF (but ignored) >Oct 29 11:35:55 unused NetworkManager[791]: <info> (ens5): new Ethernet device (driver: 'e1000' ifindex: 2) >Oct 29 11:35:55 unused NetworkManager[791]: <info> (ens5): exported as /org/freedesktop/NetworkManager/Devices/1 >Oct 29 11:35:55 unused NetworkManager[791]: <info> (ens5): device state change: unmanaged -> unavailable (reason 'managed') [10 20 2] >Oct 29 11:35:55 unused systemd: Started Network Manager. >Oct 29 11:35:55 unused systemd: Starting LSB: Bring up/down networking... >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused NetworkManager[791]: <info> (ens5): preparing device >Oct 29 11:35:55 unused NetworkManager[791]: <info> (ens5): device state change: unavailable -> disconnected (reason 'none') [20 30 0] >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused kernel: IPv6: ADDRCONF(NETDEV_UP): ens5: link is not ready >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused NetworkManager[791]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:35:55 unused network: Bringing up loopback interface: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused dbus-daemon: dbus[677]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:35:55 unused dbus[677]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused NetworkManager[791]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:35:55 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused NetworkManager[791]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:35:55 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused NetworkManager[791]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 11:35:55 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused network: [ OK ] >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused NetworkManager[791]: <warn> Failed to activate 'ens5': Connection 'ens5' is not available on the device ens5 at this time. >Oct 29 11:35:55 unused NetworkManager[791]: <info> NetworkManager state is now DISCONNECTING >Oct 29 11:35:55 unused NetworkManager[791]: <info> NetworkManager state is now DISCONNECTED >Oct 29 11:35:55 unused network: Bringing up interface ens5: Error: Connection activation failed: Connection 'ens5' is not available on the device ens5 at this time. >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused network: [FAILED] >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused systemd: network.service: control process exited, code=exited status=1 >Oct 29 11:35:55 unused systemd: Failed to start LSB: Bring up/down networking. >Oct 29 11:35:55 unused systemd: Unit network.service entered failed state. >Oct 29 11:35:55 unused systemd: Starting Network. >Oct 29 11:35:55 unused systemd: Reached target Network. >Oct 29 11:35:55 unused systemd: Started Login and scanning of iSCSI devices. >Oct 29 11:35:55 unused systemd: Starting Remote File Systems (Pre). >Oct 29 11:35:55 unused systemd: Reached target Remote File Systems (Pre). >Oct 29 11:35:55 unused systemd: Starting Remote File Systems. >Oct 29 11:35:55 unused systemd: Reached target Remote File Systems. >Oct 29 11:35:55 unused systemd: Starting Trigger Flushing of Journal to Persistent Storage... >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused systemd: Starting Virtualization daemon... >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused systemd: Starting Enable periodic update of entitlement certificates.... >Oct 29 11:35:55 unused systemd: Starting Crash recovery kernel arming... >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:55 unused systemd: Starting Postfix Mail Transport Agent... >Oct 29 11:35:55 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused systemd: Starting OpenSSH server daemon... >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused systemd: Started OpenSSH server daemon. >Oct 29 11:35:56 unused systemd: Starting /etc/rc.d/rc.local Compatibility... >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused systemd: Starting LSB: Starts the Spacewalk Daemon... >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused systemd: Started Enable periodic update of entitlement certificates.. >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused systemd: Started Trigger Flushing of Journal to Persistent Storage. >Oct 29 11:35:56 unused systemd: Starting Permit User Sessions... >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused rc.local: ens5: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500 >Oct 29 11:35:56 unused rc.local: ether 9a:4e:4f:50:51:52 txqueuelen 1000 (Ethernet) >Oct 29 11:35:56 unused rc.local: RX packets 143 bytes 11374 (11.1 KiB) >Oct 29 11:35:56 unused rc.local: RX errors 0 dropped 0 overruns 0 frame 0 >Oct 29 11:35:56 unused rc.local: TX packets 0 bytes 0 (0.0 B) >Oct 29 11:35:56 unused rc.local: TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >Oct 29 11:35:56 unused rc.local: lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 >Oct 29 11:35:56 unused rc.local: inet 127.0.0.1 netmask 255.0.0.0 >Oct 29 11:35:56 unused rc.local: inet6 ::1 prefixlen 128 scopeid 0x10<host> >Oct 29 11:35:56 unused rc.local: loop txqueuelen 0 (Local Loopback) >Oct 29 11:35:56 unused rc.local: RX packets 12 bytes 1296 (1.2 KiB) >Oct 29 11:35:56 unused rc.local: RX errors 0 dropped 0 overruns 0 frame 0 >Oct 29 11:35:56 unused rc.local: TX packets 12 bytes 1296 (1.2 KiB) >Oct 29 11:35:56 unused rc.local: TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >Oct 29 11:35:56 unused systemd: PID file /var/run/rhnsd.pid not readable (yet?) after start. >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused systemd: Failed to start LSB: Starts the Spacewalk Daemon. >Oct 29 11:35:56 unused systemd: Unit rhnsd.service entered failed state. >Oct 29 11:35:56 unused systemd: Started /etc/rc.d/rc.local Compatibility. >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused systemd: Started Permit User Sessions. >Oct 29 11:35:56 unused systemd: Starting Command Scheduler... >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused systemd: Started Command Scheduler. >Oct 29 11:35:56 unused systemd: Starting Job spooling tools... >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused systemd: Started Job spooling tools. >Oct 29 11:35:56 unused systemd: Starting Wait for Plymouth Boot Screen to Quit... >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused systemd: Starting GNOME Display Manager... >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused libvirtd: 2014-10-29 03:35:56.706+0000: 1276: info : libvirt version: 1.2.8, package: 4.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2014-09-26-08:45:32, x86-021.build.eng.bos.redhat.com) >Oct 29 11:35:56 unused libvirtd: 2014-10-29 03:35:56.706+0000: 1276: warning : virGetHostname:665 : getaddrinfo failed for 'unused': Name or service not known >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:56 unused systemd: Started GNOME Display Manager. >Oct 29 11:35:56 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused NetworkManager[791]: <info> (ens5): link connected >Oct 29 11:35:57 unused NetworkManager[791]: <info> Auto-activating connection 'ens5'. >Oct 29 11:35:57 unused NetworkManager[791]: <info> Activation (ens5) starting connection 'ens5' >Oct 29 11:35:57 unused NetworkManager[791]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) scheduled... >Oct 29 11:35:57 unused NetworkManager[791]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) started... >Oct 29 11:35:57 unused NetworkManager[791]: <info> (ens5): device state change: disconnected -> prepare (reason 'none') [30 40 0] >Oct 29 11:35:57 unused NetworkManager[791]: <info> NetworkManager state is now CONNECTING >Oct 29 11:35:57 unused NetworkManager[791]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) scheduled... >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused dbus[677]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.17" (uid=0 pid=1806 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.18" (uid=0 pid=1954 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused NetworkManager[791]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) complete. >Oct 29 11:35:57 unused NetworkManager[791]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) starting... >Oct 29 11:35:57 unused NetworkManager[791]: <info> (ens5): device state change: prepare -> config (reason 'none') [40 50 0] >Oct 29 11:35:57 unused NetworkManager[791]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) successful. >Oct 29 11:35:57 unused NetworkManager[791]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) complete. >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused kernel: e1000: ens5 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX >Oct 29 11:35:57 unused dbus-daemon: dbus[677]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.17" (uid=0 pid=1806 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.18" (uid=0 pid=1954 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Oct 29 11:35:57 unused kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens5: link becomes ready >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:57 unused audispd: queue is full - dropping event >Oct 29 11:35:58 unused journal: libvirt version: 1.2.8, package: 4.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2014-09-26-08:45:32, x86-021.build.eng.bos.redhat.com) >Oct 29 11:35:58 unused journal: Module /usr/lib64/libvirt/connection-driver/libvirt_driver_lxc.so not accessible >Oct 29 11:35:58 unused systemd: Started Virtualization daemon. >Oct 29 11:35:59 unused kdumpctl: kexec: loaded kdump kernel >Oct 29 11:35:59 unused kdumpctl: Starting kdump: [OK] >Oct 29 11:35:59 unused systemd: Started Crash recovery kernel arming. >Oct 29 11:35:59 unused setroubleshoot: Plugin Exception restorecon >Oct 29 11:35:59 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:35:59 unused NetworkManager[791]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) scheduled. >Oct 29 11:35:59 unused NetworkManager[791]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) started... >Oct 29 11:35:59 unused NetworkManager[791]: <info> (ens5): device state change: config -> ip-config (reason 'none') [50 70 0] >Oct 29 11:35:59 unused NetworkManager[791]: <info> Activation (ens5) Beginning DHCPv4 transaction (timeout in 45 seconds) >Oct 29 11:35:59 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:35:59 unused NetworkManager[791]: <info> dhclient started with pid 2512 >Oct 29 11:35:59 unused NetworkManager[791]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) complete. >Oct 29 11:35:59 unused systemd: Started Postfix Mail Transport Agent. >Oct 29 11:35:59 unused NetworkManager[791]: <info> (ens5): DHCPv4 state changed nbi -> preinit >Oct 29 11:35:59 unused dhclient[2512]: DHCPREQUEST on ens5 to 255.255.255.255 port 67 (xid=0x680f5010) >Oct 29 11:35:59 unused dhclient[2512]: DHCPACK from 10.66.111.254 (xid=0x680f5010) >Oct 29 11:35:59 unused dhclient[2512]: bound to 10.66.110.85 -- renewal in 6305 seconds. >Oct 29 11:35:59 unused NetworkManager[791]: <info> (ens5): DHCPv4 state changed preinit -> reboot >Oct 29 11:35:59 unused NetworkManager[791]: <info> address 10.66.110.85 >Oct 29 11:35:59 unused NetworkManager[791]: <info> plen 21 (255.255.248.0) >Oct 29 11:35:59 unused NetworkManager[791]: <info> gateway 10.66.111.254 >Oct 29 11:35:59 unused NetworkManager[791]: <info> server identifier 10.66.78.111 >Oct 29 11:35:59 unused NetworkManager[791]: <info> lease time 14400 >Oct 29 11:35:59 unused NetworkManager[791]: <info> nameserver '10.66.78.111' >Oct 29 11:35:59 unused NetworkManager[791]: <info> nameserver '10.66.78.117' >Oct 29 11:35:59 unused NetworkManager[791]: <info> nameserver '10.66.127.10' >Oct 29 11:35:59 unused NetworkManager[791]: <info> domain name 'englab.nay.redhat.com' >Oct 29 11:35:59 unused NetworkManager[791]: <info> domain name 'qe.lab.eng.nay.redhat.com' >Oct 29 11:35:59 unused NetworkManager[791]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Configure Commit) scheduled... >Oct 29 11:35:59 unused NetworkManager[791]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Commit) started... >Oct 29 11:35:59 unused NetworkManager[791]: <info> (ens5): device state change: ip-config -> ip-check (reason 'none') [70 80 0] >Oct 29 11:35:59 unused NetworkManager[791]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Commit) complete. >Oct 29 11:35:59 unused NetworkManager[791]: <info> (ens5): device state change: ip-check -> secondaries (reason 'none') [80 90 0] >Oct 29 11:35:59 unused NetworkManager[791]: <info> (ens5): device state change: secondaries -> activated (reason 'none') [90 100 0] >Oct 29 11:35:59 unused NetworkManager[791]: <info> NetworkManager state is now CONNECTED_LOCAL >Oct 29 11:35:59 unused avahi-daemon[648]: Joining mDNS multicast group on interface ens5.IPv4 with address 10.66.110.85. >Oct 29 11:35:59 unused avahi-daemon[648]: New relevant interface ens5.IPv4 for mDNS. >Oct 29 11:35:59 unused avahi-daemon[648]: Registering new address record for 10.66.110.85 on ens5.IPv4. >Oct 29 11:35:59 unused NetworkManager[791]: <info> Policy set 'ens5' (ens5) as default for IPv4 routing and DNS. >Oct 29 11:35:59 unused NetworkManager[791]: <info> Activation (ens5) successful, device activated. >Oct 29 11:35:59 unused dbus[677]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Oct 29 11:35:59 unused dbus-daemon: dbus[677]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Oct 29 11:35:59 unused systemd: Starting Network Manager Script Dispatcher Service... >Oct 29 11:35:59 unused dbus-daemon: dbus[677]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Oct 29 11:35:59 unused dbus[677]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Oct 29 11:35:59 unused systemd: Started Network Manager Script Dispatcher Service. >Oct 29 11:35:59 unused systemd: Unit iscsi.service cannot be reloaded because it is inactive. >Oct 29 11:35:59 unused setroubleshoot: Plugin Exception restorecon_source >Oct 29 11:35:59 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:35:59 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:00 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:36:00 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:00 unused systemd: Started Wait for Plymouth Boot Screen to Quit. >Oct 29 11:36:00 unused systemd: Starting Serial Getty on ttyS0... >Oct 29 11:36:00 unused systemd: Started Serial Getty on ttyS0. >Oct 29 11:36:00 unused systemd: Starting Login Prompts. >Oct 29 11:36:00 unused systemd: Reached target Login Prompts. >Oct 29 11:36:00 unused systemd: Starting Multi-User System. >Oct 29 11:36:00 unused systemd: Reached target Multi-User System. >Oct 29 11:36:00 unused systemd: Starting Graphical Interface. >Oct 29 11:36:00 unused systemd: Reached target Graphical Interface. >Oct 29 11:36:00 unused systemd: Starting Update UTMP about System Runlevel Changes... >Oct 29 11:36:00 unused systemd: Started Stop Read-Ahead Data Collection 10s After Completed Startup. >Oct 29 11:36:00 unused systemd: Started Update UTMP about System Runlevel Changes. >Oct 29 11:36:00 unused systemd: Startup finished in 776ms (kernel) + 1.989s (initrd) + 24.000s (userspace) = 26.767s. >Oct 29 11:36:00 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:36:00 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:00 unused avahi-daemon[648]: Registering new address record for fe80::984e:4fff:fe50:5152 on ens5.*. >Oct 29 11:36:00 unused systemd: Starting user-42.slice. >Oct 29 11:36:00 unused systemd: Created slice user-42.slice. >Oct 29 11:36:00 unused systemd: Starting Session c1 of user gdm. >Oct 29 11:36:00 unused systemd: Started Session c1 of user gdm. >Oct 29 11:36:00 unused systemd-logind: New session c1 of user gdm. >Oct 29 11:36:00 unused systemd-logind: Linked /tmp/.X11-unix/X0 to /run/user/42/X11-display. >Oct 29 11:36:00 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 11:36:00 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:01 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4232f3ec-5ccd-4850-ba76-4a70ff4565b6 >Oct 29 11:36:01 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:01 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 29 11:36:01 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:01 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 29 11:36:01 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:01 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f60195bb-d64d-4eb0-a8f4-cf8a2b920ac8 >Oct 29 11:36:01 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:01 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5ab16217-4ece-422d-83ed-2d510b7f6e4a >Oct 29 11:36:01 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:01 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l adc127d5-3ba3-4600-a18a-c60d41d563f5 >Oct 29 11:36:01 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:01 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:36:01 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:02 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 06db745f-002f-4e84-a79a-b463031747bc >Oct 29 11:36:02 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:02 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 06db745f-002f-4e84-a79a-b463031747bc >Oct 29 11:36:02 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:02 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:36:02 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:02 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8a2839f5-9652-4d11-b7f0-45cf9ee50720 >Oct 29 11:36:02 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:02 unused dbus-daemon: dbus[677]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Oct 29 11:36:02 unused dbus[677]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Oct 29 11:36:02 unused systemd: Starting Daemon for power management... >Oct 29 11:36:02 unused dbus-daemon: dbus[677]: [system] Successfully activated service 'org.freedesktop.UPower' >Oct 29 11:36:02 unused dbus[677]: [system] Successfully activated service 'org.freedesktop.UPower' >Oct 29 11:36:02 unused systemd: Started Daemon for power management. >Oct 29 11:36:02 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:36:02 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:02 unused NetworkManager[791]: <info> startup complete >Oct 29 11:36:02 unused gnome-session: (gnome-settings-daemon:2812): power-plugin-WARNING **: failed to turn the panel on: Display is not DPMS capable >Oct 29 11:36:02 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 11:36:02 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:02 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l bb129500-3477-472a-b1a1-1b7d123c1da8 >Oct 29 11:36:02 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:03 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d95da5c3-8c53-450d-a9b2-dfb19b652de8 >Oct 29 11:36:03 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:03 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l db8f5c38-2bac-4875-a619-b204531cc812 >Oct 29 11:36:03 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:03 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 149193bb-28ed-4b94-9604-5e107a9da7e2 >Oct 29 11:36:03 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:03 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2003831-eae3-45bc-9b03-1dd96a73f949 >Oct 29 11:36:03 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:03 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d95da5c3-8c53-450d-a9b2-dfb19b652de8 >Oct 29 11:36:03 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:03 unused dbus-daemon: dbus[677]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Oct 29 11:36:03 unused dbus[677]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Oct 29 11:36:03 unused gnome-session: Entering running state >Oct 29 11:36:03 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:36:03 unused systemd: Starting Manage, Install and Generate Color Profiles... >Oct 29 11:36:03 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:03 unused colord: Using config file /etc/colord.conf >Oct 29 11:36:03 unused colord: Using mapping database file /var/lib/colord/mapping.db >Oct 29 11:36:03 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5ab16217-4ece-422d-83ed-2d510b7f6e4a >Oct 29 11:36:03 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:03 unused colord: Using device database file /var/lib/colord/storage.db >Oct 29 11:36:03 unused colord: loaded plugin libcd_plugin_camera.so >Oct 29 11:36:03 unused colord: loaded plugin libcd_plugin_scanner.so >Oct 29 11:36:03 unused colord: Daemon ready for requests >Oct 29 11:36:03 unused dbus-daemon: dbus[677]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Oct 29 11:36:03 unused dbus[677]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Oct 29 11:36:03 unused systemd: Started Manage, Install and Generate Color Profiles. >Oct 29 11:36:03 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 11:36:04 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:04 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 41005440-a55b-4233-93f3-db86ea99daba >Oct 29 11:36:04 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:04 unused colord: Profile added: icc-021ec903471f953c28c57ccde43f9134 >Oct 29 11:36:04 unused colord: Profile added: icc-7e1e684edc9a0671f5305d656d8cb8c9 >Oct 29 11:36:04 unused colord: Profile added: icc-0f6451e33e7342d0f90bb960912bb812 >Oct 29 11:36:04 unused colord: Profile added: icc-8f465237bb45ee1d16fdbd6b4038c719 >Oct 29 11:36:04 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l af15d032-e5b6-477a-a4e0-d0db84c92e84 >Oct 29 11:36:04 unused colord: Profile added: icc-8daff74b7142df23f76b3d5ef126bbf9 >Oct 29 11:36:04 unused colord: Profile added: icc-f16a3fe7a0d2f471188cf45202ae43ac >Oct 29 11:36:04 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:04 unused rtkit-daemon[674]: Successfully made thread 3067 of process 3067 (/usr/bin/pulseaudio) owned by '42' high priority at nice level -11. >Oct 29 11:36:04 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l af15d032-e5b6-477a-a4e0-d0db84c92e84 >Oct 29 11:36:04 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:04 unused dbus-daemon: dbus[677]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 29 11:36:04 unused dbus[677]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 29 11:36:04 unused systemd: Starting Locale Service... >Oct 29 11:36:04 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 75ef4f58-c198-49a6-9668-ae14c8a7007b >Oct 29 11:36:04 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:04 unused gnome-session: (gnome-settings-daemon:2812): color-plugin-WARNING **: failed to get edid: unable to get EDID for output >Oct 29 11:36:04 unused dbus-daemon: dbus[677]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 29 11:36:04 unused dbus[677]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 29 11:36:04 unused systemd: Started Locale Service. >Oct 29 11:36:04 unused colord: Device added: xrandr-Virtual-0 >Oct 29 11:36:04 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b91b4263-e2c9-413f-9c5f-7869cacdb578 >Oct 29 11:36:04 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:04 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 97aea7ca-00fe-4e40-af8e-e0ec40282528 >Oct 29 11:36:04 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:04 unused gnome-session: (gnome-settings-daemon:2812): color-plugin-WARNING **: unable to get EDID for xrandr-Virtual-0: unable to get EDID for output >Oct 29 11:36:04 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 94cf47a7-5a5c-405c-ab69-1601b787f238 >Oct 29 11:36:04 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:05 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 05d5fa63-cbd7-453f-b673-c378b16914f0 >Oct 29 11:36:05 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:05 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:36:05 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:05 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:36:05 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:05 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::primary after class was initialised >Oct 29 11:36:05 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::index after class was initialised >Oct 29 11:36:05 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:36:05 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:05 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8a64fd6d-c54b-4627-b7b5-44f0b14979dd >Oct 29 11:36:05 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:05 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 396a1310-4088-41c8-90a8-d43b4f19499c >Oct 29 11:36:05 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:05 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 396a1310-4088-41c8-90a8-d43b4f19499c >Oct 29 11:36:05 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:05 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d772382b-e332-4fba-8873-f558166b6023 >Oct 29 11:36:05 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:06 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2094586-a8f8-4bc1-af02-534887cfd2f4 >Oct 29 11:36:06 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:06 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2094586-a8f8-4bc1-af02-534887cfd2f4 >Oct 29 11:36:06 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:06 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0b13c0cf-312e-4166-b485-88d815f566fb >Oct 29 11:36:06 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:06 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b427ecb2-8229-4dc3-b9ee-ffea01dcd104 >Oct 29 11:36:06 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:06 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:36:06 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:06 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0e7f911c-862c-4a1b-bdef-924387d5c7e9 >Oct 29 11:36:06 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:06 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:36:06 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:06 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 04b4c9d6-e337-439c-bb70-255a7898dcb3 >Oct 29 11:36:06 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:07 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:36:07 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:07 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5f10f707-7a84-461f-9e81-f835d4ea195d >Oct 29 11:36:07 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:07 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:36:07 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:07 unused gnome-session: JS LOG: GNOME Shell started at Wed Oct 29 2014 11:36:07 GMT+0800 (CST) >Oct 29 11:36:07 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0e378e0b-9b3c-4d2f-84b9-ce2845665953 >Oct 29 11:36:07 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:07 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b94cfdf3-87b2-4b6e-abf5-837aee9d5e47 >Oct 29 11:36:07 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:07 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:36:07 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:07 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 829d18ca-3d16-4e5a-8496-a95d9ab10d6c >Oct 29 11:36:07 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:07 unused dbus-daemon: dbus[677]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Oct 29 11:36:07 unused dbus[677]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Oct 29 11:36:07 unused systemd: Starting Fingerprint Authentication Daemon... >Oct 29 11:36:07 unused dbus-daemon: dbus[677]: [system] Successfully activated service 'net.reactivated.Fprint' >Oct 29 11:36:07 unused dbus[677]: [system] Successfully activated service 'net.reactivated.Fprint' >Oct 29 11:36:07 unused systemd: Started Fingerprint Authentication Daemon. >Oct 29 11:36:08 unused fprintd: Launching FprintObject >Oct 29 11:36:08 unused fprintd: ** Message: D-Bus service launched with name: net.reactivated.Fprint >Oct 29 11:36:08 unused fprintd: ** Message: entering main loop >Oct 29 11:36:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 63dc4b7a-9372-4551-bd5d-9f0980157bc4 >Oct 29 11:36:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l be15d920-943b-4dae-ab10-813bdf4c9056 >Oct 29 11:36:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:36:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f31e2e16-ef9a-43df-bba1-a28015fc34cb >Oct 29 11:36:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:36:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f31e2e16-ef9a-43df-bba1-a28015fc34cb >Oct 29 11:36:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:36:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:36:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 11:36:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:36:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:36:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 88a7869a-040a-4f0e-80c5-b6a4e8755bb3 >Oct 29 11:36:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:36:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 11:36:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l dc7e7c9b-7e67-4b25-821f-418ef1def3e4 >Oct 29 11:36:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:36:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:36:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 11:36:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8dd8c574-fc63-4b6f-9f6c-45c2df7870d4 >Oct 29 11:36:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 11:36:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 3ed0fa73-53ef-48c0-bb88-c1fd8f856461 >Oct 29 11:36:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 11:36:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 11:36:11 unused dbus-daemon: string index out of range >Oct 29 11:36:11 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 29 11:36:38 unused fprintd: ** Message: No devices in use, exit >Oct 29 11:37:03 unused systemd: Starting user-0.slice. >Oct 29 11:37:03 unused systemd: Created slice user-0.slice. >Oct 29 11:37:03 unused systemd: Starting Session 1 of user root. >Oct 29 11:37:03 unused systemd-logind: New session 1 of user root. >Oct 29 11:37:03 unused systemd: Started Session 1 of user root. >Oct 29 11:39:07 unused chronyd[662]: Selected source 10.5.26.10 >Oct 29 11:39:07 unused chronyd[662]: System clock wrong by 0.785857 seconds, adjustment started >Oct 29 11:39:42 unused systemd: Stopping Session 1 of user root. >Oct 29 11:39:42 unused systemd: Stopping Session c1 of user gdm. >Oct 29 11:39:42 unused systemd: Stopping LVM2 PV scan on device 8:2... >Oct 29 11:39:42 unused systemd: Stopping system-getty.slice. >Oct 29 11:39:42 unused systemd: Removed slice system-getty.slice. >Oct 29 11:39:42 unused systemd: Stopping Dump dmesg to /var/log/dmesg... >Oct 29 11:39:42 unused systemd: Stopped Dump dmesg to /var/log/dmesg. >Oct 29 11:39:42 unused systemd: Stopping Graphical Interface. >Oct 29 11:39:42 unused systemd: Stopped target Graphical Interface. >Oct 29 11:39:42 unused systemd: Stopping Multi-User System. >Oct 29 11:39:42 unused systemd: Stopped target Multi-User System. >Oct 29 11:39:42 unused systemd: Stopping Command Scheduler... >Oct 29 11:39:42 unused systemd: Stopping libstoragemgmt plug-in server daemon... >Oct 29 11:39:42 unused systemd: Stopping Virtualization daemon... >Oct 29 11:39:42 unused systemd: Stopping Job spooling tools... >Oct 29 11:39:42 unused systemd: Stopping NTP client/server... >Oct 29 11:39:42 unused systemd: Stopping Kernel Samepage Merging (KSM) Tuning Daemon... >Oct 29 11:39:42 unused gdm: Tried to look up non-existent conversation gdm-launch-environment >Oct 29 11:39:42 unused colord: device removed: xrandr-Virtual-0 >Oct 29 11:39:42 unused chronyd[662]: chronyd exiting >Oct 29 11:39:42 unused rsyslogd: [origin software="rsyslogd" swVersion="7.4.7" x-pid="655" x-info="http://www.rsyslog.com"] exiting on signal 15. >Oct 29 12:30:57 unused rsyslogd: [origin software="rsyslogd" swVersion="7.4.7" x-pid="658" x-info="http://www.rsyslog.com"] start >Oct 29 12:30:41 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 12:30:41 unused kernel: Initializing cgroup subsys cpuset >Oct 29 12:30:41 unused kernel: Initializing cgroup subsys cpu >Oct 29 12:30:41 unused kernel: Initializing cgroup subsys cpuacct >Oct 29 12:30:41 unused kernel: Linux version 3.10.0-196.el7.x86_64 (mockbuild@x86-018.build.eng.bos.redhat.com) (gcc version 4.8.3 20140911 (Red Hat 4.8.3-7) (GCC) ) #1 SMP Tue Oct 28 11:16:22 EDT 2014 >Oct 29 12:30:41 unused kernel: Command line: BOOT_IMAGE=/vmlinuz-3.10.0-196.el7.x86_64 root=/dev/mapper/rhel_unused-root ro crashkernel=auto rd.lvm.lv=rhel_unused/root rd.lvm.lv=rhel_unused/swap console=tty0 console=ttyS0,115200 LANG=en_US.UTF-8 systemd.debug >Oct 29 12:30:41 unused kernel: e820: BIOS-provided physical RAM map: >Oct 29 12:30:41 unused kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable >Oct 29 12:30:41 unused kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved >Oct 29 12:30:41 unused kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved >Oct 29 12:30:41 unused kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdffff] usable >Oct 29 12:30:41 unused kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved >Oct 29 12:30:41 unused kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved >Oct 29 12:30:41 unused kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved >Oct 29 12:30:41 unused kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable >Oct 29 12:30:41 unused kernel: NX (Execute Disable) protection: active >Oct 29 12:30:41 unused kernel: SMBIOS 2.8 present. >Oct 29 12:30:41 unused kernel: Hypervisor detected: KVM >Oct 29 12:30:41 unused kernel: No AGP bridge found >Oct 29 12:30:41 unused kernel: e820: last_pfn = 0x140000 max_arch_pfn = 0x400000000 >Oct 29 12:30:41 unused kernel: x86 PAT enabled: cpu 0, old 0x7040600070406, new 0x7010600070106 >Oct 29 12:30:41 unused kernel: e820: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 >Oct 29 12:30:41 unused kernel: found SMP MP-table at [mem 0x000f2030-0x000f203f] mapped at [ffff8800000f2030] >Oct 29 12:30:41 unused kernel: init_memory_mapping: [mem 0x00000000-0x000fffff] >Oct 29 12:30:41 unused kernel: init_memory_mapping: [mem 0x13fe00000-0x13fffffff] >Oct 29 12:30:41 unused kernel: init_memory_mapping: [mem 0x13c000000-0x13fdfffff] >Oct 29 12:30:41 unused kernel: init_memory_mapping: [mem 0x100000000-0x13bffffff] >Oct 29 12:30:41 unused kernel: init_memory_mapping: [mem 0x00100000-0xbffdffff] >Oct 29 12:30:41 unused kernel: RAMDISK: [mem 0x35d2e000-0x36e8efff] >Oct 29 12:30:41 unused kernel: ACPI: RSDP 00000000000f1d90 00014 (v00 BOCHS ) >Oct 29 12:30:41 unused kernel: ACPI: RSDT 00000000bffe1931 00030 (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001) >Oct 29 12:30:41 unused kernel: ACPI: FACP 00000000bffe0b37 00074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001) >Oct 29 12:30:41 unused kernel: ACPI: DSDT 00000000bffe0040 00AF7 (v01 BOCHS BXPCDSDT 00000001 BXPC 00000001) >Oct 29 12:30:41 unused kernel: ACPI: FACS 00000000bffe0000 00040 >Oct 29 12:30:41 unused kernel: ACPI: SSDT 00000000bffe0bab 00CF6 (v01 BOCHS BXPCSSDT 00000001 BXPC 00000001) >Oct 29 12:30:41 unused kernel: ACPI: APIC 00000000bffe18a1 00090 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001) >Oct 29 12:30:41 unused kernel: No NUMA configuration found >Oct 29 12:30:41 unused kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] >Oct 29 12:30:41 unused kernel: Initmem setup node 0 [mem 0x00000000-0x13fffffff] >Oct 29 12:30:41 unused kernel: NODE_DATA [mem 0x13ffd6000-0x13fffcfff] >Oct 29 12:30:41 unused kernel: Reserving 161MB of memory at 688MB for crashkernel (System RAM: 4095MB) >Oct 29 12:30:41 unused kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 >Oct 29 12:30:41 unused kernel: kvm-clock: cpu 0, msr 1:3ff86001, primary cpu clock >Oct 29 12:30:41 unused kernel: Zone ranges: >Oct 29 12:30:41 unused kernel: DMA [mem 0x00001000-0x00ffffff] >Oct 29 12:30:41 unused kernel: DMA32 [mem 0x01000000-0xffffffff] >Oct 29 12:30:41 unused kernel: Normal [mem 0x100000000-0x13fffffff] >Oct 29 12:30:41 unused kernel: Movable zone start for each node >Oct 29 12:30:41 unused kernel: Early memory node ranges >Oct 29 12:30:41 unused kernel: node 0: [mem 0x00001000-0x0009efff] >Oct 29 12:30:41 unused kernel: node 0: [mem 0x00100000-0xbffdffff] >Oct 29 12:30:41 unused kernel: node 0: [mem 0x100000000-0x13fffffff] >Oct 29 12:30:41 unused kernel: ACPI: PM-Timer IO Port: 0x608 >Oct 29 12:30:41 unused kernel: ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled) >Oct 29 12:30:41 unused kernel: ACPI: LAPIC (acpi_id[0x01] lapic_id[0x01] enabled) >Oct 29 12:30:41 unused kernel: ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled) >Oct 29 12:30:41 unused kernel: ACPI: LAPIC (acpi_id[0x03] lapic_id[0x03] enabled) >Oct 29 12:30:41 unused kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) >Oct 29 12:30:41 unused kernel: ACPI: IOAPIC (id[0x00] address[0xfec00000] gsi_base[0]) >Oct 29 12:30:41 unused kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 >Oct 29 12:30:41 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) >Oct 29 12:30:41 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) >Oct 29 12:30:41 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) >Oct 29 12:30:41 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) >Oct 29 12:30:41 unused kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) >Oct 29 12:30:41 unused kernel: Using ACPI (MADT) for SMP configuration information >Oct 29 12:30:41 unused kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs >Oct 29 12:30:41 unused kernel: PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff] >Oct 29 12:30:41 unused kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000effff] >Oct 29 12:30:41 unused kernel: PM: Registered nosave memory: [mem 0x000f0000-0x000fffff] >Oct 29 12:30:41 unused kernel: PM: Registered nosave memory: [mem 0xbffe0000-0xbfffffff] >Oct 29 12:30:41 unused kernel: PM: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] >Oct 29 12:30:41 unused kernel: PM: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] >Oct 29 12:30:41 unused kernel: PM: Registered nosave memory: [mem 0xff000000-0xfffbffff] >Oct 29 12:30:41 unused kernel: PM: Registered nosave memory: [mem 0xfffc0000-0xffffffff] >Oct 29 12:30:41 unused kernel: e820: [mem 0xc0000000-0xfeffbfff] available for PCI devices >Oct 29 12:30:41 unused kernel: Booting paravirtualized kernel on KVM >Oct 29 12:30:41 unused kernel: setup_percpu: NR_CPUS:5120 nr_cpumask_bits:4 nr_cpu_ids:4 nr_node_ids:1 >Oct 29 12:30:41 unused kernel: PERCPU: Embedded 29 pages/cpu @ffff88013fc00000 s86720 r8192 d23872 u524288 >Oct 29 12:30:41 unused kernel: KVM setup async PF for cpu 0 >Oct 29 12:30:41 unused kernel: kvm-stealtime: cpu 0, msr 13fc0e000 >Oct 29 12:30:41 unused kernel: Built 1 zonelists in Node order, mobility grouping on. Total pages: 1032041 >Oct 29 12:30:41 unused kernel: Policy zone: Normal >Oct 29 12:30:41 unused kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-3.10.0-196.el7.x86_64 root=/dev/mapper/rhel_unused-root ro crashkernel=auto rd.lvm.lv=rhel_unused/root rd.lvm.lv=rhel_unused/swap console=tty0 console=ttyS0,115200 LANG=en_US.UTF-8 systemd.debug >Oct 29 12:30:41 unused kernel: PID hash table entries: 4096 (order: 3, 32768 bytes) >Oct 29 12:30:41 unused kernel: xsave: enabled xstate_bv 0x7, cntxt size 0x340 >Oct 29 12:30:41 unused kernel: Checking aperture... >Oct 29 12:30:41 unused kernel: No AGP bridge found >Oct 29 12:30:41 unused kernel: Memory: 3863488k/5242880k available (6240k kernel code, 1049096k absent, 330296k reserved, 4181k data, 1604k init) >Oct 29 12:30:41 unused kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 >Oct 29 12:30:41 unused kernel: Hierarchical RCU implementation. >Oct 29 12:30:41 unused kernel: RCU restricting CPUs from NR_CPUS=5120 to nr_cpu_ids=4. >Oct 29 12:30:41 unused kernel: Experimental no-CBs for all CPUs >Oct 29 12:30:41 unused kernel: Experimental no-CBs CPUs: 0-3. >Oct 29 12:30:41 unused kernel: NR_IRQS:327936 nr_irqs:712 16 >Oct 29 12:30:41 unused kernel: Console: colour VGA+ 80x25 >Oct 29 12:30:41 unused kernel: console [tty0] enabled >Oct 29 12:30:41 unused kernel: console [ttyS0] enabled >Oct 29 12:30:41 unused kernel: allocated 16777216 bytes of page_cgroup >Oct 29 12:30:41 unused kernel: please try 'cgroup_disable=memory' option if you don't want memory cgroups >Oct 29 12:30:41 unused kernel: tsc: Detected 1999.999 MHz processor >Oct 29 12:30:41 unused kernel: Calibrating delay loop (skipped) preset value.. 3999.99 BogoMIPS (lpj=1999999) >Oct 29 12:30:41 unused kernel: pid_max: default: 32768 minimum: 301 >Oct 29 12:30:41 unused kernel: Security Framework initialized >Oct 29 12:30:41 unused kernel: SELinux: Initializing. >Oct 29 12:30:41 unused kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes) >Oct 29 12:30:41 unused kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes) >Oct 29 12:30:41 unused kernel: Mount-cache hash table entries: 4096 >Oct 29 12:30:41 unused kernel: Initializing cgroup subsys memory >Oct 29 12:30:41 unused kernel: Initializing cgroup subsys devices >Oct 29 12:30:41 unused kernel: Initializing cgroup subsys freezer >Oct 29 12:30:41 unused kernel: Initializing cgroup subsys net_cls >Oct 29 12:30:41 unused kernel: Initializing cgroup subsys blkio >Oct 29 12:30:41 unused kernel: Initializing cgroup subsys perf_event >Oct 29 12:30:41 unused kernel: Initializing cgroup subsys hugetlb >Oct 29 12:30:41 unused kernel: CPU: Physical Processor ID: 0 >Oct 29 12:30:41 unused kernel: CPU: Processor Core ID: 0 >Oct 29 12:30:41 unused kernel: mce: CPU supports 10 MCE banks >Oct 29 12:30:41 unused kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 >Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0 >tlb_flushall_shift: 6 >Oct 29 12:30:41 unused kernel: Freeing SMP alternatives: 24k freed >Oct 29 12:30:41 unused kernel: ACPI: Core revision 20130517 >Oct 29 12:30:41 unused kernel: ACPI: All ACPI Tables successfully acquired >Oct 29 12:30:41 unused kernel: ftrace: allocating 23897 entries in 94 pages >Oct 29 12:30:41 unused kernel: Enabling x2apic >Oct 29 12:30:41 unused kernel: Enabled x2apic >Oct 29 12:30:41 unused kernel: Switched APIC routing to physical x2apic. >Oct 29 12:30:41 unused kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 >Oct 29 12:30:41 unused kernel: smpboot: CPU0: Intel Xeon E312xx (Sandy Bridge) (fam: 06, model: 2a, stepping: 01) >Oct 29 12:30:41 unused kernel: Performance Events: unsupported p6 CPU model 42 no PMU driver, software events only. >Oct 29 12:30:41 unused kernel: KVM setup paravirtual spinlock >Oct 29 12:30:41 unused kernel: NMI watchdog: disabled (cpu0): hardware events not enabled >Oct 29 12:30:41 unused kernel: kvm-clock: cpu 1, msr 1:3ff86041, secondary cpu clock >Oct 29 12:30:41 unused kernel: KVM setup async PF for cpu 1 >Oct 29 12:30:41 unused kernel: kvm-stealtime: cpu 1, msr 13fc8e000 >Oct 29 12:30:41 unused kernel: kvm-clock: cpu 2, msr 1:3ff86081, secondary cpu clock >Oct 29 12:30:41 unused kernel: KVM setup async PF for cpu 2 >Oct 29 12:30:41 unused kernel: smpboot: Booting Node 0, Processors #1 #2 #3 OK >Oct 29 12:30:41 unused kernel: kvm-stealtime: cpu 2, msr 13fd0e000 >Oct 29 12:30:41 unused kernel: kvm-clock: cpu 3, msr 1:3ff860c1, secondary cpu clock >Oct 29 12:30:41 unused kernel: Brought up 4 CPUs >Oct 29 12:30:41 unused kernel: KVM setup async PF for cpu 3 >Oct 29 12:30:41 unused kernel: kvm-stealtime: cpu 3, msr 13fd8e000 >Oct 29 12:30:41 unused kernel: smpboot: Total of 4 processors activated (15999.99 BogoMIPS) >Oct 29 12:30:41 unused kernel: devtmpfs: initialized >Oct 29 12:30:41 unused kernel: EVM: security.selinux >Oct 29 12:30:41 unused kernel: EVM: security.ima >Oct 29 12:30:41 unused kernel: EVM: security.capability >Oct 29 12:30:41 unused kernel: atomic64 test passed for x86-64 platform with CX8 and with SSE >Oct 29 12:30:41 unused kernel: NET: Registered protocol family 16 >Oct 29 12:30:41 unused kernel: ACPI: bus type PCI registered >Oct 29 12:30:41 unused kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 >Oct 29 12:30:41 unused kernel: PCI: Using configuration type 1 for base access >Oct 29 12:30:41 unused kernel: ACPI: Added _OSI(Module Device) >Oct 29 12:30:41 unused kernel: ACPI: Added _OSI(Processor Device) >Oct 29 12:30:41 unused kernel: ACPI: Added _OSI(3.0 _SCP Extensions) >Oct 29 12:30:41 unused kernel: ACPI: Added _OSI(Processor Aggregator Device) >Oct 29 12:30:41 unused kernel: ACPI: Interpreter enabled >Oct 29 12:30:41 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S1_] (20130517/hwxface-571) >Oct 29 12:30:41 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S2_] (20130517/hwxface-571) >Oct 29 12:30:41 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S3_] (20130517/hwxface-571) >Oct 29 12:30:41 unused kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S4_] (20130517/hwxface-571) >Oct 29 12:30:41 unused kernel: ACPI: (supports S0 S5) >Oct 29 12:30:41 unused kernel: ACPI: Using IOAPIC for interrupt routing >Oct 29 12:30:41 unused kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug >Oct 29 12:30:41 unused kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) >Oct 29 12:30:41 unused kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI] >Oct 29 12:30:41 unused kernel: acpi PNP0A03:00: _OSC failed (AE_NOT_FOUND); disabling ASPM >Oct 29 12:30:41 unused kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. >Oct 29 12:30:41 unused kernel: acpiphp: Slot [4] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [5] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [6] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [7] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [8] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [9] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [10] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [11] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [12] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [13] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [14] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [15] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [16] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [17] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [18] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [19] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [20] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [21] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [22] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [23] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [24] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [25] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [26] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [27] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [28] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [29] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [30] registered >Oct 29 12:30:41 unused kernel: acpiphp: Slot [31] registered >Oct 29 12:30:41 unused kernel: PCI host bridge to bus 0000:00 >Oct 29 12:30:41 unused kernel: pci_bus 0000:00: root bus resource [bus 00-ff] >Oct 29 12:30:41 unused kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7] >Oct 29 12:30:41 unused kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xadff] >Oct 29 12:30:41 unused kernel: pci_bus 0000:00: root bus resource [io 0xae0f-0xaeff] >Oct 29 12:30:41 unused kernel: pci_bus 0000:00: root bus resource [io 0xaf20-0xafdf] >Oct 29 12:30:41 unused kernel: pci_bus 0000:00: root bus resource [io 0xafe4-0xffff] >Oct 29 12:30:41 unused kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff] >Oct 29 12:30:41 unused kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff] >Oct 29 12:30:41 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] >Oct 29 12:30:41 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] >Oct 29 12:30:41 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] >Oct 29 12:30:41 unused kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] >Oct 29 12:30:41 unused kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI >Oct 29 12:30:41 unused kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB >Oct 29 12:30:41 unused kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) >Oct 29 12:30:41 unused kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) >Oct 29 12:30:41 unused kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) >Oct 29 12:30:41 unused kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) >Oct 29 12:30:41 unused kernel: ACPI: PCI Interrupt Link [LNKS] (IRQs *9) >Oct 29 12:30:41 unused kernel: ACPI: Enabled 16 GPEs in block 00 to 0F >Oct 29 12:30:41 unused kernel: vgaarb: device added: PCI:0000:00:02.0,decodes=io+mem,owns=io+mem,locks=none >Oct 29 12:30:41 unused kernel: vgaarb: loaded >Oct 29 12:30:41 unused kernel: vgaarb: bridge control possible 0000:00:02.0 >Oct 29 12:30:41 unused kernel: SCSI subsystem initialized >Oct 29 12:30:41 unused kernel: ACPI: bus type USB registered >Oct 29 12:30:41 unused kernel: usbcore: registered new interface driver usbfs >Oct 29 12:30:41 unused kernel: usbcore: registered new interface driver hub >Oct 29 12:30:41 unused kernel: usbcore: registered new device driver usb >Oct 29 12:30:41 unused kernel: PCI: Using ACPI for IRQ routing >Oct 29 12:30:41 unused kernel: NetLabel: Initializing >Oct 29 12:30:41 unused kernel: NetLabel: domain hash size = 128 >Oct 29 12:30:41 unused kernel: NetLabel: protocols = UNLABELED CIPSOv4 >Oct 29 12:30:41 unused kernel: NetLabel: unlabeled traffic allowed by default >Oct 29 12:30:41 unused kernel: Switching to clocksource kvm-clock >Oct 29 12:30:41 unused kernel: pnp: PnP ACPI init >Oct 29 12:30:41 unused kernel: ACPI: bus type PNP registered >Oct 29 12:30:41 unused kernel: pnp: PnP ACPI: found 5 devices >Oct 29 12:30:41 unused kernel: ACPI: bus type PNP unregistered >Oct 29 12:30:41 unused kernel: NET: Registered protocol family 2 >Oct 29 12:30:41 unused kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes) >Oct 29 12:30:41 unused kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes) >Oct 29 12:30:41 unused kernel: TCP: Hash tables configured (established 32768 bind 32768) >Oct 29 12:30:41 unused kernel: TCP: reno registered >Oct 29 12:30:41 unused kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes) >Oct 29 12:30:41 unused kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes) >Oct 29 12:30:41 unused kernel: NET: Registered protocol family 1 >Oct 29 12:30:41 unused kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers >Oct 29 12:30:41 unused kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release >Oct 29 12:30:41 unused kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds >Oct 29 12:30:41 unused kernel: ACPI: PCI Interrupt Link [LNKC] enabled at IRQ 11 >Oct 29 12:30:41 unused kernel: Unpacking initramfs... >Oct 29 12:30:41 unused kernel: Freeing initrd memory: 17796k freed >Oct 29 12:30:41 unused kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) >Oct 29 12:30:41 unused kernel: software IO TLB [mem 0xbbfe0000-0xbffe0000] (64MB) mapped at [ffff8800bbfe0000-ffff8800bffdffff] >Oct 29 12:30:41 unused kernel: microcode: CPU0 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 12:30:41 unused kernel: microcode: CPU1 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 12:30:41 unused kernel: microcode: CPU2 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 12:30:41 unused kernel: microcode: CPU3 sig=0x206a1, pf=0x1, revision=0x1 >Oct 29 12:30:41 unused kernel: microcode: Microcode Update Driver: v2.00 <tigran@aivazian.fsnet.co.uk>, Peter Oruba >Oct 29 12:30:41 unused kernel: futex hash table entries: 1024 (order: 4, 65536 bytes) >Oct 29 12:30:41 unused kernel: Initialise system trusted keyring >Oct 29 12:30:41 unused kernel: audit: initializing netlink socket (disabled) >Oct 29 12:30:41 unused kernel: type=2000 audit(1414557040.958:1): initialized >Oct 29 12:30:41 unused kernel: HugeTLB registered 2 MB page size, pre-allocated 0 pages >Oct 29 12:30:41 unused kernel: zbud: loaded >Oct 29 12:30:41 unused kernel: VFS: Disk quotas dquot_6.5.2 >Oct 29 12:30:41 unused kernel: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) >Oct 29 12:30:41 unused kernel: msgmni has been set to 7580 >Oct 29 12:30:41 unused kernel: Key type big_key registered >Oct 29 12:30:41 unused kernel: alg: No test for stdrng (krng) >Oct 29 12:30:41 unused kernel: NET: Registered protocol family 38 >Oct 29 12:30:41 unused kernel: Key type asymmetric registered >Oct 29 12:30:41 unused kernel: Asymmetric key parser 'x509' registered >Oct 29 12:30:41 unused kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 252) >Oct 29 12:30:41 unused kernel: io scheduler noop registered >Oct 29 12:30:41 unused kernel: io scheduler deadline registered (default) >Oct 29 12:30:41 unused kernel: io scheduler cfq registered >Oct 29 12:30:41 unused kernel: pci_hotplug: PCI Hot Plug PCI Core version: 0.5 >Oct 29 12:30:41 unused kernel: pciehp: PCI Express Hot Plug Controller Driver version: 0.4 >Oct 29 12:30:41 unused kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 >Oct 29 12:30:41 unused kernel: ACPI: Power Button [PWRF] >Oct 29 12:30:41 unused kernel: GHES: HEST is not enabled! >Oct 29 12:30:41 unused kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled >Oct 29 12:30:41 unused kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A >Oct 29 12:30:41 unused kernel: Non-volatile memory driver v1.3 >Oct 29 12:30:41 unused kernel: Linux agpgart interface v0.103 >Oct 29 12:30:41 unused kernel: crash memory driver: version 1.1 >Oct 29 12:30:41 unused kernel: rdac: device handler registered >Oct 29 12:30:41 unused kernel: hp_sw: device handler registered >Oct 29 12:30:41 unused kernel: emc: device handler registered >Oct 29 12:30:41 unused kernel: alua: device handler registered >Oct 29 12:30:41 unused kernel: libphy: Fixed MDIO Bus: probed >Oct 29 12:30:41 unused kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver >Oct 29 12:30:41 unused kernel: ehci-pci: EHCI PCI platform driver >Oct 29 12:30:41 unused kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver >Oct 29 12:30:41 unused kernel: ohci-pci: OHCI PCI platform driver >Oct 29 12:30:41 unused kernel: uhci_hcd: USB Universal Host Controller Interface driver >Oct 29 12:30:41 unused kernel: uhci_hcd 0000:00:03.0: UHCI Host Controller >Oct 29 12:30:41 unused kernel: uhci_hcd 0000:00:03.0: new USB bus registered, assigned bus number 1 >Oct 29 12:30:41 unused kernel: uhci_hcd 0000:00:03.0: detected 2 ports >Oct 29 12:30:41 unused kernel: uhci_hcd 0000:00:03.0: irq 11, io base 0x0000c0a0 >Oct 29 12:30:41 unused kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001 >Oct 29 12:30:41 unused kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Oct 29 12:30:41 unused kernel: usb usb1: Product: UHCI Host Controller >Oct 29 12:30:41 unused kernel: usb usb1: Manufacturer: Linux 3.10.0-196.el7.x86_64 uhci_hcd >Oct 29 12:30:41 unused kernel: usb usb1: SerialNumber: 0000:00:03.0 >Oct 29 12:30:41 unused kernel: hub 1-0:1.0: USB hub found >Oct 29 12:30:41 unused kernel: hub 1-0:1.0: 2 ports detected >Oct 29 12:30:41 unused kernel: usbcore: registered new interface driver usbserial >Oct 29 12:30:41 unused kernel: usbcore: registered new interface driver usbserial_generic >Oct 29 12:30:41 unused kernel: usbserial: USB Serial support registered for generic >Oct 29 12:30:41 unused kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 >Oct 29 12:30:41 unused kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 >Oct 29 12:30:41 unused kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 >Oct 29 12:30:41 unused kernel: mousedev: PS/2 mouse device common for all mice >Oct 29 12:30:41 unused kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 >Oct 29 12:30:41 unused kernel: rtc_cmos 00:00: RTC can wake from S4 >Oct 29 12:30:41 unused kernel: rtc_cmos 00:00: rtc core: registered rtc_cmos as rtc0 >Oct 29 12:30:41 unused kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram >Oct 29 12:30:41 unused kernel: cpuidle: using governor menu >Oct 29 12:30:41 unused kernel: hidraw: raw HID events driver (C) Jiri Kosina >Oct 29 12:30:41 unused kernel: usbcore: registered new interface driver usbhid >Oct 29 12:30:41 unused kernel: usbhid: USB HID core driver >Oct 29 12:30:41 unused kernel: drop_monitor: Initializing network drop monitor service >Oct 29 12:30:41 unused kernel: TCP: cubic registered >Oct 29 12:30:41 unused kernel: Initializing XFRM netlink socket >Oct 29 12:30:41 unused kernel: NET: Registered protocol family 10 >Oct 29 12:30:41 unused kernel: NET: Registered protocol family 17 >Oct 29 12:30:41 unused kernel: Loading compiled-in X.509 certificates >Oct 29 12:30:41 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' >Oct 29 12:30:41 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' >Oct 29 12:30:41 unused kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: 8c65d2217a39e9fa0bc841f8ba391e662cf68bcc' >Oct 29 12:30:41 unused kernel: registered taskstats version 1 >Oct 29 12:30:41 unused kernel: Key type trusted registered >Oct 29 12:30:41 unused kernel: Key type encrypted registered >Oct 29 12:30:41 unused kernel: IMA: No TPM chip found, activating TPM-bypass! >Oct 29 12:30:41 unused kernel: rtc_cmos 00:00: setting system clock to 2014-10-29 04:30:41 UTC (1414557041) >Oct 29 12:30:41 unused kernel: Freeing unused kernel memory: 1604k freed >Oct 29 12:30:41 unused systemd[1]: Unknown kernel switch systemd.debug. Ignoring. >Oct 29 12:30:41 unused systemd[1]: Supported kernel switches: >Oct 29 12:30:41 unused systemd[1]: systemd.unit=UNIT Default unit to start >Oct 29 12:30:41 unused systemd[1]: rd.systemd.unit=UNIT Default unit to start when run in initrd >Oct 29 12:30:41 unused systemd[1]: systemd.dump_core=0|1 Dump core on crash >Oct 29 12:30:41 unused systemd[1]: systemd.crash_shell=0|1 Run shell on crash >Oct 29 12:30:41 unused systemd[1]: systemd.crash_chvt=N Change to VT #N on crash >Oct 29 12:30:41 unused systemd[1]: systemd.confirm_spawn=0|1 Confirm every process spawn >Oct 29 12:30:41 unused systemd[1]: systemd.show_status=0|1 Show status updates on the console during bootup >Oct 29 12:30:41 unused systemd[1]: systemd.log_target=console|kmsg|journal|journal-or-kmsg|syslog|syslog-or-kmsg|null >Oct 29 12:30:41 unused systemd[1]: Log target >Oct 29 12:30:41 unused systemd[1]: systemd.log_level=LEVEL Log level >Oct 29 12:30:41 unused systemd[1]: systemd.log_color=0|1 Highlight important log messages >Oct 29 12:30:41 unused systemd[1]: systemd.log_location=0|1 Include code location in log messages >Oct 29 12:30:41 unused systemd[1]: systemd.default_standard_output=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 12:30:41 unused systemd[1]: Set default log output for services >Oct 29 12:30:41 unused systemd[1]: systemd.default_standard_error=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 12:30:41 unused systemd[1]: Set default log error output for services >Oct 29 12:30:41 unused systemd[1]: systemd.setenv=ASSIGNMENT Set an environment variable for all spawned processes >Oct 29 12:30:41 unused systemd[1]: systemd 208 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ) >Oct 29 12:30:41 unused systemd[1]: Detected virtualization 'kvm'. >Oct 29 12:30:41 unused systemd[1]: Running in initial RAM disk. >Oct 29 12:30:41 unused systemd[1]: Set hostname to <unused>. >Oct 29 12:30:41 unused systemd[1]: Expecting device dev-mapper-rhel_unused\x2droot.device... >Oct 29 12:30:41 unused systemd[1]: Starting -.slice. >Oct 29 12:30:41 unused systemd[1]: Created slice -.slice. >Oct 29 12:30:41 unused systemd[1]: Starting System Slice. >Oct 29 12:30:41 unused systemd[1]: Created slice System Slice. >Oct 29 12:30:41 unused systemd[1]: Starting Slices. >Oct 29 12:30:41 unused systemd[1]: Reached target Slices. >Oct 29 12:30:41 unused systemd[1]: Starting Timers. >Oct 29 12:30:41 unused systemd[1]: Reached target Timers. >Oct 29 12:30:41 unused systemd[1]: Starting Journal Socket. >Oct 29 12:30:41 unused systemd[1]: Listening on Journal Socket. >Oct 29 12:30:41 unused systemd[1]: Started dracut ask for additional cmdline parameters. >Oct 29 12:30:41 unused systemd[1]: Starting dracut cmdline hook... >Oct 29 12:30:41 unused systemd[1]: Started Load Kernel Modules. >Oct 29 12:30:41 unused systemd[1]: Starting Setup Virtual Console... >Oct 29 12:30:41 unused systemd[1]: Starting Journal Service... >Oct 29 12:30:41 unused systemd[1]: Started Journal Service. >Oct 29 12:30:41 unused journal: Journal started >Oct 29 12:30:41 unused systemd: Starting udev Kernel Socket. >Oct 29 12:30:41 unused systemd: Listening on udev Kernel Socket. >Oct 29 12:30:41 unused systemd: Starting udev Control Socket. >Oct 29 12:30:41 unused systemd: Listening on udev Control Socket. >Oct 29 12:30:41 unused systemd: Starting Sockets. >Oct 29 12:30:41 unused systemd: Reached target Sockets. >Oct 29 12:30:41 unused systemd: Starting Create list of required static device nodes for the current kernel... >Oct 29 12:30:41 unused systemd: Starting Apply Kernel Variables... >Oct 29 12:30:41 unused systemd: Starting Swap. >Oct 29 12:30:41 unused systemd: Reached target Swap. >Oct 29 12:30:41 unused systemd: Starting Local File Systems. >Oct 29 12:30:41 unused systemd: Reached target Local File Systems. >Oct 29 12:30:41 unused systemd: Started Apply Kernel Variables. >Oct 29 12:30:41 unused systemd: Started Create list of required static device nodes for the current kernel. >Oct 29 12:30:41 unused systemd: Starting Create static device nodes in /dev... >Oct 29 12:30:41 unused dracut-cmdline: dracut-7.1 (Maipo) dracut-033-224.el7 >Oct 29 12:30:41 unused dracut-cmdline: Using kernel command line parameters: >Oct 29 12:30:41 unused systemd: Started Create static device nodes in /dev. >Oct 29 12:30:41 unused systemd: Started Setup Virtual Console. >Oct 29 12:30:41 unused kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd >Oct 29 12:30:41 unused systemd: Started dracut cmdline hook. >Oct 29 12:30:41 unused systemd: Starting dracut pre-udev hook... >Oct 29 12:30:41 unused kernel: device-mapper: uevent: version 1.0.3 >Oct 29 12:30:41 unused kernel: device-mapper: ioctl: 4.27.0-ioctl (2013-10-30) initialised: dm-devel@redhat.com >Oct 29 12:30:41 unused systemd: Started dracut pre-udev hook. >Oct 29 12:30:41 unused systemd: Starting udev Kernel Device Manager... >Oct 29 12:30:41 unused systemd-udevd[261]: starting version 208 >Oct 29 12:30:41 unused systemd: Started udev Kernel Device Manager. >Oct 29 12:30:41 unused systemd: Started dracut pre-trigger hook. >Oct 29 12:30:41 unused systemd: Starting udev Coldplug all Devices... >Oct 29 12:30:41 unused systemd: Mounting Configuration File System... >Oct 29 12:30:41 unused systemd: Mounted Configuration File System. >Oct 29 12:30:41 unused systemd: Started udev Coldplug all Devices. >Oct 29 12:30:41 unused systemd: Starting dracut initqueue hook... >Oct 29 12:30:41 unused systemd: Starting System Initialization. >Oct 29 12:30:41 unused systemd: Reached target System Initialization. >Oct 29 12:30:41 unused systemd: Starting Show Plymouth Boot Screen... >Oct 29 12:30:41 unused kernel: FDC 0 is a S82078B >Oct 29 12:30:41 unused kernel: [drm] Initialized drm 1.1.0 20060810 >Oct 29 12:30:41 unused kernel: e1000: Intel(R) PRO/1000 Network Driver - version 7.3.21-k8-NAPI >Oct 29 12:30:41 unused kernel: e1000: Copyright (c) 1999-2006 Intel Corporation. >Oct 29 12:30:41 unused systemd: Started Show Plymouth Boot Screen. >Oct 29 12:30:41 unused systemd: Started Dispatch Password Requests to Console Directory Watch. >Oct 29 12:30:41 unused systemd: Starting Paths. >Oct 29 12:30:41 unused systemd: Reached target Paths. >Oct 29 12:30:41 unused systemd: Starting Forward Password Requests to Plymouth Directory Watch. >Oct 29 12:30:41 unused systemd: Started Forward Password Requests to Plymouth Directory Watch. >Oct 29 12:30:41 unused systemd: Starting Basic System. >Oct 29 12:30:41 unused systemd: Reached target Basic System. >Oct 29 12:30:41 unused kernel: ACPI: PCI Interrupt Link [LNKD] enabled at IRQ 10 >Oct 29 12:30:41 unused kernel: scsi host0: ata_piix >Oct 29 12:30:41 unused kernel: scsi host2: ata_piix >Oct 29 12:30:41 unused kernel: scsi host1: Virtio SCSI HBA >Oct 29 12:30:41 unused kernel: scsi 1:0:0:0: Direct-Access QEMU QEMU HARDDISK 2.1. PQ: 0 ANSI: 5 >Oct 29 12:30:41 unused kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001 >Oct 29 12:30:41 unused kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 >Oct 29 12:30:41 unused kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 >Oct 29 12:30:41 unused kernel: scsi 1:0:1:0: CD-ROM QEMU QEMU CD-ROM 2.1. PQ: 0 ANSI: 5 >Oct 29 12:30:41 unused kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=5 >Oct 29 12:30:41 unused kernel: usb 1-1: Product: QEMU USB Tablet >Oct 29 12:30:41 unused kernel: usb 1-1: Manufacturer: QEMU >Oct 29 12:30:41 unused kernel: usb 1-1: SerialNumber: 42 >Oct 29 12:30:41 unused kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:03.0/usb1/1-1/1-1:1.0/input/input2 >Oct 29 12:30:41 unused kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Pointer [QEMU QEMU USB Tablet] on usb-0000:00:03.0-1/input0 >Oct 29 12:30:41 unused kernel: ACPI: PCI Interrupt Link [LNKA] enabled at IRQ 10 >Oct 29 12:30:42 unused kernel: sr 1:0:1:0: [sr0] scsi3-mmc drive: 16x/50x cd/rw xa/form2 cdda tray >Oct 29 12:30:42 unused kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 >Oct 29 12:30:42 unused kernel: sd 1:0:0:0: [sda] 41943040 512-byte logical blocks: (21.4 GB/20.0 GiB) >Oct 29 12:30:42 unused kernel: sd 1:0:0:0: [sda] Write Protect is off >Oct 29 12:30:42 unused kernel: sd 1:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA >Oct 29 12:30:42 unused kernel: sda: sda1 sda2 >Oct 29 12:30:42 unused kernel: sd 1:0:0:0: [sda] Attached SCSI disk >Oct 29 12:30:42 unused kernel: e1000 0000:00:05.0 eth0: (PCI:33MHz:32-bit) 9a:4e:4f:50:51:52 >Oct 29 12:30:42 unused kernel: e1000 0000:00:05.0 eth0: Intel(R) PRO/1000 Network Connection >Oct 29 12:30:42 unused kernel: tsc: Refined TSC clocksource calibration: 2000.001 MHz >Oct 29 12:30:42 unused kernel: ACPI: PCI Interrupt Link [LNKB] enabled at IRQ 11 >Oct 29 12:30:42 unused kernel: [drm] Device Version 0.0 >Oct 29 12:30:42 unused kernel: [drm] Compression level 0 log level 0 >Oct 29 12:30:42 unused systemd-udevd[265]: renamed network interface eth0 to ens5 >Oct 29 12:30:42 unused kernel: [drm] Currently using mode #0, list at 0x488 >Oct 29 12:30:42 unused kernel: [drm] 12286 io pages at offset 0x1000000 >Oct 29 12:30:42 unused kernel: [drm] 16777216 byte draw area at offset 0x0 >Oct 29 12:30:42 unused kernel: [drm] RAM header offset: 0x3ffe000 >Oct 29 12:30:42 unused kernel: [drm] rom modes offset 0x488 for 128 modes >Oct 29 12:30:42 unused kernel: [TTM] Zone kernel: Available graphics memory: 1941456 kiB >Oct 29 12:30:42 unused kernel: [TTM] Initializing pool allocator >Oct 29 12:30:42 unused kernel: [TTM] Initializing DMA pool allocator >Oct 29 12:30:42 unused kernel: [drm] qxl: 16M of VRAM memory size >Oct 29 12:30:42 unused kernel: [drm] qxl: 63M of IO pages memory ready (VRAM domain) >Oct 29 12:30:42 unused kernel: [drm] qxl: 32M of Surface memory size >Oct 29 12:30:42 unused kernel: [drm] main mem slot 1 [f8000000,3ffe000] >Oct 29 12:30:42 unused kernel: [drm] surface mem slot 2 [fc000000,2000000] >Oct 29 12:30:42 unused kernel: [drm] fb mappable at 0xF8000000, size 3145728 >Oct 29 12:30:42 unused kernel: [drm] fb: depth 24, pitch 4096, width 1024, height 768 >Oct 29 12:30:42 unused kernel: fbcon: qxldrmfb (fb0) is primary device >Oct 29 12:30:42 unused kernel: Console: switching to colour frame buffer device 128x48 >Oct 29 12:30:42 unused kernel: qxl 0000:00:02.0: fb0: qxldrmfb frame buffer device >Oct 29 12:30:42 unused kernel: qxl 0000:00:02.0: registered panic notifier >Oct 29 12:30:42 unused kernel: [drm] Initialized qxl 0.1.0 20120117 for 0000:00:02.0 on minor 0 >Oct 29 12:30:42 unused dracut-initqueue: Scanning devices sda2 for LVM logical volumes rhel_unused/root rhel_unused/swap >Oct 29 12:30:42 unused dracut-initqueue: inactive '/dev/rhel_unused/swap' [2.00 GiB] inherit >Oct 29 12:30:42 unused dracut-initqueue: inactive '/dev/rhel_unused/root' [17.47 GiB] inherit >Oct 29 12:30:42 unused kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 >Oct 29 12:30:42 unused systemd: Found device /dev/mapper/rhel_unused-root. >Oct 29 12:30:42 unused systemd: Starting File System Check on /dev/mapper/rhel_unused-root... >Oct 29 12:30:42 unused systemd-fsck: /sbin/fsck.xfs: XFS file system. >Oct 29 12:30:42 unused systemd: Started File System Check on /dev/mapper/rhel_unused-root. >Oct 29 12:30:42 unused systemd: Started dracut initqueue hook. >Oct 29 12:30:42 unused systemd: Started dracut pre-mount hook. >Oct 29 12:30:42 unused systemd: Mounting /sysroot... >Oct 29 12:30:42 unused systemd: Starting Remote File Systems (Pre). >Oct 29 12:30:42 unused systemd: Reached target Remote File Systems (Pre). >Oct 29 12:30:42 unused systemd: Starting Remote File Systems. >Oct 29 12:30:42 unused systemd: Reached target Remote File Systems. >Oct 29 12:30:42 unused kernel: SGI XFS with ACLs, security attributes, large block/inode numbers, no debug enabled >Oct 29 12:30:42 unused kernel: XFS (dm-0): Mounting V4 Filesystem >Oct 29 12:30:42 unused kernel: XFS (dm-0): Ending clean mount >Oct 29 12:30:42 unused systemd: Mounted /sysroot. >Oct 29 12:30:42 unused systemd: Starting Initrd Root File System. >Oct 29 12:30:42 unused systemd: Reached target Initrd Root File System. >Oct 29 12:30:42 unused systemd: Starting Reload Configuration from the Real Root... >Oct 29 12:30:42 unused systemd: Reloading. >Oct 29 12:30:42 unused systemd: Started Reload Configuration from the Real Root. >Oct 29 12:30:42 unused systemd: Starting Initrd File Systems. >Oct 29 12:30:42 unused systemd: Reached target Initrd File Systems. >Oct 29 12:30:42 unused systemd: Started dracut mount hook. >Oct 29 12:30:42 unused systemd: Starting Initrd Default Target. >Oct 29 12:30:42 unused systemd: Reached target Initrd Default Target. >Oct 29 12:30:42 unused systemd: Starting dracut pre-pivot and cleanup hook... >Oct 29 12:30:42 unused systemd: Started dracut pre-pivot and cleanup hook. >Oct 29 12:30:42 unused systemd: Starting Cleaning Up and Shutting Down Daemons... >Oct 29 12:30:42 unused systemd: Stopping Cleaning Up and Shutting Down Daemons... >Oct 29 12:30:42 unused systemd: Starting Plymouth switch root service... >Oct 29 12:30:42 unused systemd: Stopped Cleaning Up and Shutting Down Daemons. >Oct 29 12:30:42 unused systemd: Stopping dracut pre-pivot and cleanup hook... >Oct 29 12:30:42 unused systemd: Stopped dracut pre-pivot and cleanup hook. >Oct 29 12:30:42 unused systemd: Stopping Remote File Systems. >Oct 29 12:30:42 unused systemd: Stopped target Remote File Systems. >Oct 29 12:30:42 unused systemd: Stopping Remote File Systems (Pre). >Oct 29 12:30:42 unused systemd: Stopped target Remote File Systems (Pre). >Oct 29 12:30:42 unused systemd: Stopping dracut initqueue hook... >Oct 29 12:30:42 unused systemd: Stopped dracut initqueue hook. >Oct 29 12:30:42 unused systemd: Stopping Initrd Default Target. >Oct 29 12:30:42 unused systemd: Stopped target Initrd Default Target. >Oct 29 12:30:42 unused systemd: Stopping Basic System. >Oct 29 12:30:42 unused systemd: Stopped target Basic System. >Oct 29 12:30:42 unused systemd: Stopping Slices. >Oct 29 12:30:42 unused systemd: Stopped target Slices. >Oct 29 12:30:42 unused systemd: Stopping Paths. >Oct 29 12:30:42 unused systemd: Stopped target Paths. >Oct 29 12:30:42 unused systemd: Stopping Timers. >Oct 29 12:30:42 unused systemd: Stopped target Timers. >Oct 29 12:30:42 unused systemd: Stopping Sockets. >Oct 29 12:30:42 unused systemd: Stopped target Sockets. >Oct 29 12:30:42 unused systemd: Stopping System Initialization. >Oct 29 12:30:42 unused systemd: Stopped target System Initialization. >Oct 29 12:30:42 unused systemd: Stopping Apply Kernel Variables... >Oct 29 12:30:42 unused systemd: Stopped Apply Kernel Variables. >Oct 29 12:30:42 unused systemd: Stopping udev Coldplug all Devices... >Oct 29 12:30:42 unused systemd: Stopped udev Coldplug all Devices. >Oct 29 12:30:42 unused systemd: Stopping Swap. >Oct 29 12:30:42 unused systemd: Stopped target Swap. >Oct 29 12:30:42 unused systemd: Stopping Local File Systems. >Oct 29 12:30:42 unused systemd: Stopped target Local File Systems. >Oct 29 12:30:42 unused systemd: Stopping udev Kernel Device Manager... >Oct 29 12:30:42 unused systemd: Stopped udev Kernel Device Manager. >Oct 29 12:30:42 unused systemd: Stopping dracut pre-udev hook... >Oct 29 12:30:42 unused systemd: Stopped dracut pre-udev hook. >Oct 29 12:30:42 unused systemd: Stopping dracut cmdline hook... >Oct 29 12:30:42 unused systemd: Stopped dracut cmdline hook. >Oct 29 12:30:42 unused systemd: Stopping Create static device nodes in /dev... >Oct 29 12:30:42 unused systemd: Stopped Create static device nodes in /dev. >Oct 29 12:30:42 unused systemd: Stopping Create list of required static device nodes for the current kernel... >Oct 29 12:30:42 unused systemd: Stopped Create list of required static device nodes for the current kernel. >Oct 29 12:30:42 unused systemd: Stopping udev Kernel Socket. >Oct 29 12:30:42 unused systemd: Closed udev Kernel Socket. >Oct 29 12:30:42 unused systemd: Stopping udev Control Socket. >Oct 29 12:30:42 unused systemd: Closed udev Control Socket. >Oct 29 12:30:42 unused systemd: Starting Cleanup udevd DB... >Oct 29 12:30:42 unused systemd: Started Cleanup udevd DB. >Oct 29 12:30:42 unused systemd: Starting Switch Root. >Oct 29 12:30:42 unused systemd: Reached target Switch Root. >Oct 29 12:30:43 unused systemd: Started Plymouth switch root service. >Oct 29 12:30:43 unused systemd: Starting Switch Root... >Oct 29 12:30:43 unused systemd: Switching root. >Oct 29 12:30:43 unused journal: Journal stopped >Oct 29 12:30:48 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 12:30:48 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 12:30:48 unused systemd-journald[109]: Received SIGTERM >Oct 29 12:30:48 unused kernel: type=1404 audit(1414557043.612:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 >Oct 29 12:30:48 unused kernel: type=1403 audit(1414557043.855:3): policy loaded auid=4294967295 ses=4294967295 >Oct 29 12:30:48 unused systemd[1]: Successfully loaded SELinux policy in 278.599ms. >Oct 29 12:30:48 unused systemd[1]: Relabelled /dev and /run in 21.299ms. >Oct 29 12:30:48 unused systemd[1]: Unknown kernel switch systemd.debug. Ignoring. >Oct 29 12:30:48 unused systemd[1]: Supported kernel switches: >Oct 29 12:30:48 unused systemd[1]: systemd.unit=UNIT Default unit to start >Oct 29 12:30:48 unused systemd[1]: rd.systemd.unit=UNIT Default unit to start when run in initrd >Oct 29 12:30:48 unused systemd[1]: systemd.dump_core=0|1 Dump core on crash >Oct 29 12:30:48 unused systemd[1]: systemd.crash_shell=0|1 Run shell on crash >Oct 29 12:30:48 unused systemd[1]: systemd.crash_chvt=N Change to VT #N on crash >Oct 29 12:30:48 unused systemd[1]: systemd.confirm_spawn=0|1 Confirm every process spawn >Oct 29 12:30:48 unused systemd[1]: systemd.show_status=0|1 Show status updates on the console during bootup >Oct 29 12:30:48 unused systemd[1]: systemd.log_target=console|kmsg|journal|journal-or-kmsg|syslog|syslog-or-kmsg|null >Oct 29 12:30:48 unused systemd[1]: Log target >Oct 29 12:30:48 unused systemd[1]: systemd.log_level=LEVEL Log level >Oct 29 12:30:48 unused systemd[1]: systemd.log_color=0|1 Highlight important log messages >Oct 29 12:30:48 unused systemd[1]: systemd.log_location=0|1 Include code location in log messages >Oct 29 12:30:48 unused systemd[1]: systemd.default_standard_output=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 12:30:48 unused systemd[1]: Set default log output for services >Oct 29 12:30:48 unused systemd[1]: systemd.default_standard_error=null|tty|syslog|syslog+console|kmsg|kmsg+console|journal|journal+console >Oct 29 12:30:48 unused systemd[1]: Set default log error output for services >Oct 29 12:30:48 unused systemd[1]: systemd.setenv=ASSIGNMENT Set an environment variable for all spawned processes >Oct 29 12:30:48 unused journal: Journal started >Oct 29 12:30:48 unused systemd-cgroups-agent: Failed to get D-Bus connection: Unknown error -1 >Oct 29 12:30:48 unused systemd: systemd 208 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ) >Oct 29 12:30:48 unused systemd: Detected virtualization 'kvm'. >Oct 29 12:30:48 unused systemd: Set hostname to <unused>. >Oct 29 12:30:48 unused systemd: /usr/lib/systemd/system-generators/anaconda-generator exited with exit status 1. >Oct 29 12:30:48 unused systemd: [/usr/lib/systemd/system/lvm2-lvmetad.socket:9] Unknown lvalue 'RemoveOnStop' in section 'Socket' >Oct 29 12:30:48 unused systemd: [/usr/lib/systemd/system/dm-event.socket:10] Unknown lvalue 'RemoveOnStop' in section 'Socket' >Oct 29 12:30:48 unused systemd: Starting LVM2 metadata daemon... >Oct 29 12:30:48 unused systemd: Started LVM2 metadata daemon. >Oct 29 12:30:48 unused systemd: Started Load/Save Random Seed. >Oct 29 12:30:48 unused systemd: Started Import network configuration from initramfs. >Oct 29 12:30:48 unused systemd: Started Create static device nodes in /dev. >Oct 29 12:30:48 unused systemd: Started Configure read-only root support. >Oct 29 12:30:48 unused systemd: Starting udev Kernel Device Manager... >Oct 29 12:30:48 unused systemd: Starting Local File Systems (Pre). >Oct 29 12:30:48 unused systemd: Reached target Local File Systems (Pre). >Oct 29 12:30:48 unused lvm: 2 logical volume(s) in volume group "rhel_unused" monitored >Oct 29 12:30:48 unused systemd: Started udev Kernel Device Manager. >Oct 29 12:30:48 unused systemd-udevd[533]: starting version 208 >Oct 29 12:30:48 unused systemd: Started Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. >Oct 29 12:30:48 unused systemd: Started udev Wait for Complete Device Initialization. >Oct 29 12:30:48 unused systemd: Starting Activation of DM RAID sets... >Oct 29 12:30:48 unused systemd: Found device /dev/ttyS0. >Oct 29 12:30:48 unused kernel: input: PC Speaker as /devices/platform/pcspkr/input/input4 >Oct 29 12:30:49 unused kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 >Oct 29 12:30:49 unused kernel: ppdev: user-space parallel port driver >Oct 29 12:30:49 unused mtp-probe: checking bus 1, device 2: "/sys/devices/pci0000:00/0000:00:03.0/usb1/1-1" >Oct 29 12:30:49 unused mtp-probe: bus: 1, device: 2 was not an MTP device >Oct 29 12:30:49 unused systemd: Started Activation of DM RAID sets. >Oct 29 12:30:49 unused systemd: Starting Encrypted Volumes. >Oct 29 12:30:49 unused systemd: Reached target Encrypted Volumes. >Oct 29 12:30:49 unused kernel: alg: No test for __gcm-aes-aesni (__driver-gcm-aes-aesni) >Oct 29 12:30:49 unused kernel: alg: No test for crc32 (crc32-pclmul) >Oct 29 12:30:49 unused systemd: Starting LVM2 PV scan on device 8:2... >Oct 29 12:30:49 unused kernel: intel_rapl: no valid rapl domains found in package 0 >Oct 29 12:30:49 unused lvm: 2 logical volume(s) in volume group "rhel_unused" now active >Oct 29 12:30:49 unused systemd: Found device /dev/mapper/rhel_unused-swap. >Oct 29 12:30:49 unused systemd: Activating swap /dev/mapper/rhel_unused-swap... >Oct 29 12:30:49 unused systemd: Found device QEMU_HARDDISK. >Oct 29 12:30:49 unused systemd: Mounting /boot... >Oct 29 12:30:49 unused kernel: Adding 2097148k swap on /dev/mapper/rhel_unused-swap. Priority:-1 extents:1 across:2097148k FS >Oct 29 12:30:49 unused systemd: Started LVM2 PV scan on device 8:2. >Oct 29 12:30:49 unused systemd: Activated swap /dev/mapper/rhel_unused-swap. >Oct 29 12:30:49 unused systemd: Starting Swap. >Oct 29 12:30:49 unused systemd: Reached target Swap. >Oct 29 12:30:49 unused kernel: XFS (sda1): Mounting V4 Filesystem >Oct 29 12:30:55 unused kernel: XFS (sda1): Ending clean mount >Oct 29 12:30:55 unused systemd: Mounted /boot. >Oct 29 12:30:55 unused systemd: Starting Local File Systems. >Oct 29 12:30:55 unused systemd: Reached target Local File Systems. >Oct 29 12:30:55 unused systemd: Started Mark the need to relabel after reboot. >Oct 29 12:30:55 unused systemd: Started Relabel all filesystems, if necessary. >Oct 29 12:30:55 unused systemd: Started Reconfigure the system on administrator request. >Oct 29 12:30:55 unused systemd: Starting Create Volatile Files and Directories... >Oct 29 12:30:55 unused systemd: Starting Tell Plymouth To Write Out Runtime Data... >Oct 29 12:30:55 unused systemd: Started Create Volatile Files and Directories. >Oct 29 12:30:55 unused systemd: Starting Security Auditing Service... >Oct 29 12:30:56 unused auditd[619]: Started dispatcher: /sbin/audispd pid: 629 >Oct 29 12:30:56 unused kernel: type=1305 audit(1414557056.152:4): audit_pid=619 old=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 >Oct 29 12:30:56 unused augenrules: /sbin/augenrules: No change >Oct 29 12:30:56 unused audispd: audispd initialized with q_depth=150 and 1 active plugins >Oct 29 12:30:56 unused auditd[619]: Init complete, auditd 2.4 listening for events (startup state enable) >Oct 29 12:30:56 unused augenrules: No rules >Oct 29 12:30:56 unused augenrules: enabled 1 >Oct 29 12:30:56 unused augenrules: flag 1 >Oct 29 12:30:56 unused augenrules: pid 619 >Oct 29 12:30:56 unused augenrules: rate_limit 0 >Oct 29 12:30:56 unused augenrules: backlog_limit 320 >Oct 29 12:30:56 unused augenrules: lost 0 >Oct 29 12:30:56 unused augenrules: backlog 1 >Oct 29 12:30:56 unused systemd: Started Security Auditing Service. >Oct 29 12:30:56 unused systemd: Starting Update UTMP about System Reboot/Shutdown... >Oct 29 12:30:56 unused systemd: Started Tell Plymouth To Write Out Runtime Data. >Oct 29 12:30:56 unused systemd: Started Update UTMP about System Reboot/Shutdown. >Oct 29 12:30:56 unused systemd: Starting System Initialization. >Oct 29 12:30:56 unused systemd: Reached target System Initialization. >Oct 29 12:30:56 unused systemd: Starting Daily Cleanup of Temporary Directories. >Oct 29 12:30:56 unused systemd: Started Daily Cleanup of Temporary Directories. >Oct 29 12:30:56 unused systemd: Starting Timers. >Oct 29 12:30:56 unused systemd: Reached target Timers. >Oct 29 12:30:56 unused systemd: Starting Open-iSCSI iscsid Socket. >Oct 29 12:30:56 unused systemd: Listening on Open-iSCSI iscsid Socket. >Oct 29 12:30:56 unused systemd: Starting Open-iSCSI iscsiuio Socket. >Oct 29 12:30:56 unused systemd: Listening on Open-iSCSI iscsiuio Socket. >Oct 29 12:30:56 unused systemd: Starting RPCbind Server Activation Socket. >Oct 29 12:30:56 unused systemd: Listening on RPCbind Server Activation Socket. >Oct 29 12:30:56 unused systemd: Starting Avahi mDNS/DNS-SD Stack Activation Socket. >Oct 29 12:30:56 unused systemd: Listening on Avahi mDNS/DNS-SD Stack Activation Socket. >Oct 29 12:30:56 unused systemd: Starting Flexible branding. >Oct 29 12:30:56 unused systemd: Started Flexible branding. >Oct 29 12:30:56 unused systemd: Starting Paths. >Oct 29 12:30:56 unused systemd: Reached target Paths. >Oct 29 12:30:56 unused systemd: Starting D-Bus System Message Bus Socket. >Oct 29 12:30:56 unused systemd: Listening on D-Bus System Message Bus Socket. >Oct 29 12:30:56 unused systemd: Starting Sockets. >Oct 29 12:30:56 unused systemd: Reached target Sockets. >Oct 29 12:30:56 unused systemd: Starting Basic System. >Oct 29 12:30:56 unused systemd: Reached target Basic System. >Oct 29 12:30:56 unused systemd: Starting firewalld - dynamic firewall daemon... >Oct 29 12:30:56 unused systemd: Started Load CPU microcode update. >Oct 29 12:30:56 unused systemd: Starting Dump dmesg to /var/log/dmesg... >Oct 29 12:30:56 unused systemd: Started Software RAID monitoring and management. >Oct 29 12:30:56 unused systemd: Starting libstoragemgmt plug-in server daemon... >Oct 29 12:30:56 unused systemd: Started libstoragemgmt plug-in server daemon. >Oct 29 12:30:56 unused systemd: Starting Avahi mDNS/DNS-SD Stack... >Oct 29 12:30:57 unused systemd: Starting NTP client/server... >Oct 29 12:30:57 unused systemd: Starting Kernel Samepage Merging... >Oct 29 12:30:57 unused avahi-daemon[649]: Found user 'avahi' (UID 70) and group 'avahi' (GID 70). >Oct 29 12:30:57 unused avahi-daemon[649]: Successfully dropped root privileges. >Oct 29 12:30:57 unused avahi-daemon[649]: avahi-daemon 0.6.31 starting up. >Oct 29 12:30:57 unused avahi-daemon[649]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns! >Oct 29 12:30:57 unused systemd: Starting Rollback uncommitted netcf network config change transactions... >Oct 29 12:30:57 unused systemd: Starting System Logging Service... >Oct 29 12:30:57 unused netcf-transaction.sh: Running start: No pending transaction to rollback >Oct 29 12:30:57 unused systemd: Starting Resets System Activity Logs... >Oct 29 12:30:57 unused systemd: Starting Self Monitoring and Reporting Technology (SMART) Daemon... >Oct 29 12:30:57 unused systemd: Started Self Monitoring and Reporting Technology (SMART) Daemon. >Oct 29 12:30:57 unused systemd: Starting Dynamic System Tuning Daemon... >Oct 29 12:30:57 unused chronyd[664]: chronyd version 1.29.1 starting >Oct 29 12:30:57 unused systemd: Starting Hardware RNG Entropy Gatherer Daemon... >Oct 29 12:30:57 unused chronyd[664]: Linux kernel major=3 minor=10 patch=0 >Oct 29 12:30:57 unused chronyd[664]: hz=100 shift_hz=7 freq_scale=1.00000000 nominal_tick=10000 slew_delta_tick=833 max_tick_bias=1000 shift_pll=2 >Oct 29 12:30:57 unused systemd: Started Hardware RNG Entropy Gatherer Daemon. >Oct 29 12:30:57 unused rngd: Unable to open file: /dev/tpm0 >Oct 29 12:30:57 unused rngd: can't open any entropy source >Oct 29 12:30:57 unused rngd: Maybe RNG device modules are not loaded >Oct 29 12:30:57 unused systemd: Started OpenSSH Server Key Generation. >Oct 29 12:30:57 unused systemd: Starting irqbalance daemon... >Oct 29 12:30:57 unused systemd: Started irqbalance daemon. >Oct 29 12:30:57 unused systemd: Starting Login Service... >Oct 29 12:30:57 unused chronyd[664]: Frequency 0.597 +/- 4.186 ppm read from /var/lib/chrony/drift >Oct 29 12:30:57 unused systemd: Starting Accounts Service... >Oct 29 12:30:57 unused systemd: Starting RealtimeKit Scheduling Policy Service... >Oct 29 12:30:57 unused smartd[662]: smartd 6.2 2013-07-26 r3841 [x86_64-linux-3.10.0-196.el7.x86_64] (local build) >Oct 29 12:30:57 unused smartd[662]: Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org >Oct 29 12:30:57 unused smartd[662]: Opened configuration file /etc/smartmontools/smartd.conf >Oct 29 12:30:57 unused smartd[662]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices >Oct 29 12:30:57 unused smartd[662]: Device: /dev/sda, opened >Oct 29 12:30:57 unused smartd[662]: Device: /dev/sda, [QEMU QEMU HARDDISK 2.1.], 21.4 GB >Oct 29 12:30:57 unused smartd[662]: Device: /dev/sda, Bad IEC (SMART) mode page, err=5, skip device >Oct 29 12:30:57 unused smartd[662]: Monitoring 0 ATA and 0 SCSI devices >Oct 29 12:30:58 unused systemd: Starting D-Bus System Message Bus... >Oct 29 12:30:58 unused systemd: Started D-Bus System Message Bus. >Oct 29 12:30:58 unused systemd: Started Dump dmesg to /var/log/dmesg. >Oct 29 12:30:58 unused systemd: Started Kernel Samepage Merging. >Oct 29 12:30:58 unused systemd: Started Rollback uncommitted netcf network config change transactions. >Oct 29 12:30:58 unused systemd: Started Resets System Activity Logs. >Oct 29 12:30:58 unused systemd: rngd.service: main process exited, code=exited, status=1/FAILURE >Oct 29 12:30:58 unused systemd: Unit rngd.service entered failed state. >Oct 29 12:30:58 unused systemd: Starting Kernel Samepage Merging (KSM) Tuning Daemon... >Oct 29 12:30:58 unused systemd: Started System Logging Service. >Oct 29 12:30:58 unused systemd: Started Kernel Samepage Merging (KSM) Tuning Daemon. >Oct 29 12:30:58 unused systemd: Started NTP client/server. >Oct 29 12:30:59 unused dbus-daemon: dbus[678]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 12:30:59 unused dbus[678]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 12:30:59 unused systemd: Started Avahi mDNS/DNS-SD Stack. >Oct 29 12:30:59 unused avahi-daemon[649]: Successfully called chroot(). >Oct 29 12:30:59 unused avahi-daemon[649]: Successfully dropped remaining capabilities. >Oct 29 12:30:59 unused avahi-daemon[649]: No service file found in /etc/avahi/services. >Oct 29 12:30:59 unused avahi-daemon[649]: Network interface enumeration completed. >Oct 29 12:30:59 unused avahi-daemon[649]: Registering HINFO record with values 'X86_64'/'LINUX'. >Oct 29 12:30:59 unused avahi-daemon[649]: Server startup complete. Host name is unused.local. Local service cookie is 1218281329. >Oct 29 12:30:59 unused systemd: Started RealtimeKit Scheduling Policy Service. >Oct 29 12:30:59 unused systemd-logind: New seat seat0. >Oct 29 12:30:59 unused systemd-logind: Watching system buttons on /dev/input/event0 (Power Button) >Oct 29 12:30:59 unused systemd: Started Login Service. >Oct 29 12:31:00 unused dbus-daemon: dbus[678]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Oct 29 12:31:00 unused dbus[678]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Oct 29 12:31:00 unused systemd: Starting Authorization Manager... >Oct 29 12:31:00 unused polkitd[717]: Started polkitd version 0.112 >Oct 29 12:31:00 unused audispd: queue is full - dropping event >Oct 29 12:31:00 unused audispd: queue is full - dropping event >Oct 29 12:31:00 unused audispd: queue is full - dropping event >Oct 29 12:31:00 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused dbus-daemon: dbus[678]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Oct 29 12:31:01 unused dbus[678]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Oct 29 12:31:01 unused systemd: Started Authorization Manager. >Oct 29 12:31:01 unused accounts-daemon[671]: started daemon version 0.6.35 >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused systemd: Started Accounts Service. >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused kernel: ip_tables: (C) 2000-2006 Netfilter Core Team >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused systemd: Started Dynamic System Tuning Daemon. >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused kernel: nf_conntrack version 0.5.0 (16384 buckets, 65536 max) >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused kernel: Ebtables v2.0 registered >Oct 29 12:31:01 unused kernel: Bridge firewalling registered >Oct 29 12:31:01 unused systemd: Started firewalld - dynamic firewall daemon. >Oct 29 12:31:01 unused systemd: Starting Network Manager... >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:01 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused NetworkManager[799]: <info> NetworkManager (version 0.9.9.1-42.git20140326.4dba720.el7) is starting... >Oct 29 12:31:02 unused NetworkManager[799]: <info> Read config: /etc/NetworkManager/NetworkManager.conf and conf.d: 10-ibft-plugin.conf, 00-server.conf >Oct 29 12:31:02 unused NetworkManager[799]: <info> WEXT support is disabled >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused kernel: cfg80211: Calling CRDA to update world regulatory domain >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused NetworkManager[799]: <info> VPN: loaded org.freedesktop.NetworkManager.libreswan >Oct 29 12:31:02 unused kernel: cfg80211: World regulatory domain updated: >Oct 29 12:31:02 unused kernel: cfg80211: DFS Master region: unset >Oct 29 12:31:02 unused kernel: cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time) >Oct 29 12:31:02 unused kernel: cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 12:31:02 unused kernel: cfg80211: (2457000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 12:31:02 unused kernel: cfg80211: (2474000 KHz - 2494000 KHz @ 20000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused kernel: cfg80211: (5170000 KHz - 5250000 KHz @ 160000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 12:31:02 unused kernel: cfg80211: (5250000 KHz - 5330000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s) >Oct 29 12:31:02 unused kernel: cfg80211: (5490000 KHz - 5730000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s) >Oct 29 12:31:02 unused kernel: cfg80211: (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 2000 mBm), (N/A) >Oct 29 12:31:02 unused kernel: cfg80211: (57240000 KHz - 63720000 KHz @ 2160000 KHz), (N/A, 0 mBm), (N/A) >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused NetworkManager[799]: ifcfg-rh: Acquired D-Bus service com.redhat.ifcfgrh1 >Oct 29 12:31:02 unused NetworkManager[799]: <info> Loaded plugin ifcfg-rh: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused NetworkManager[799]: <info> Loaded plugin iBFT: (c) 2014 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 12:31:02 unused NetworkManager[799]: <info> Loaded plugin keyfile: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused NetworkManager[799]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 12:31:02 unused NetworkManager[799]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-ens5 ... >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused NetworkManager[799]: ifcfg-rh: read connection 'ens5' >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused NetworkManager[799]: <info> monitoring kernel firmware directory '/lib/firmware'. >Oct 29 12:31:02 unused NetworkManager[799]: <info> WiFi hardware radio set enabled >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused NetworkManager[799]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-adsl.so >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused NetworkManager[799]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-bluetooth.so >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:02 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused NetworkManager[799]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-wwan.so >Oct 29 12:31:03 unused NetworkManager[799]: <info> WiFi enabled by radio killswitch; enabled by state file >Oct 29 12:31:03 unused NetworkManager[799]: <info> WWAN enabled by radio killswitch; enabled by state file >Oct 29 12:31:03 unused NetworkManager[799]: <info> WiMAX enabled by radio killswitch; enabled by state file >Oct 29 12:31:03 unused NetworkManager[799]: <info> Networking is enabled by state file >Oct 29 12:31:03 unused NetworkManager[799]: <info> (lo): link connected >Oct 29 12:31:03 unused NetworkManager[799]: <info> (lo): carrier is ON (but ignored) >Oct 29 12:31:03 unused NetworkManager[799]: <info> (lo): new Generic device (driver: 'unknown' ifindex: 1) >Oct 29 12:31:03 unused NetworkManager[799]: <info> (lo): exported as /org/freedesktop/NetworkManager/Devices/0 >Oct 29 12:31:03 unused NetworkManager[799]: <info> (ens5): carrier is OFF (but ignored) >Oct 29 12:31:03 unused NetworkManager[799]: <info> (ens5): new Ethernet device (driver: 'e1000' ifindex: 2) >Oct 29 12:31:03 unused NetworkManager[799]: <info> (ens5): exported as /org/freedesktop/NetworkManager/Devices/1 >Oct 29 12:31:03 unused NetworkManager[799]: <info> (ens5): device state change: unmanaged -> unavailable (reason 'managed') [10 20 2] >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused NetworkManager[799]: <info> (ens5): preparing device >Oct 29 12:31:03 unused NetworkManager[799]: <info> (ens5): device state change: unavailable -> disconnected (reason 'none') [20 30 0] >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused kernel: IPv6: ADDRCONF(NETDEV_UP): ens5: link is not ready >Oct 29 12:31:03 unused systemd: Started Network Manager. >Oct 29 12:31:03 unused systemd: Starting LSB: Bring up/down networking... >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused NetworkManager[799]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 12:31:03 unused network: Bringing up loopback interface: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused dbus-daemon: dbus[678]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 12:31:03 unused dbus[678]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused NetworkManager[799]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 12:31:03 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused NetworkManager[799]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 12:31:03 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused NetworkManager[799]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Oct 29 12:31:03 unused network: Could not load file '/etc/sysconfig/network-scripts/ifcfg-lo' >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused network: [ OK ] >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused NetworkManager[799]: <warn> Failed to activate 'ens5': Connection 'ens5' is not available on the device ens5 at this time. >Oct 29 12:31:03 unused NetworkManager[799]: <info> NetworkManager state is now DISCONNECTING >Oct 29 12:31:03 unused NetworkManager[799]: <info> NetworkManager state is now DISCONNECTED >Oct 29 12:31:03 unused network: Bringing up interface ens5: Error: Connection activation failed: Connection 'ens5' is not available on the device ens5 at this time. >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused network: [FAILED] >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused audispd: queue is full - dropping event >Oct 29 12:31:03 unused systemd: network.service: control process exited, code=exited status=1 >Oct 29 12:31:03 unused systemd: Failed to start LSB: Bring up/down networking. >Oct 29 12:31:03 unused systemd: Unit network.service entered failed state. >Oct 29 12:31:03 unused systemd: Starting Network. >Oct 29 12:31:03 unused systemd: Reached target Network. >Oct 29 12:31:03 unused systemd: Started Login and scanning of iSCSI devices. >Oct 29 12:31:03 unused systemd: Starting Remote File Systems (Pre). >Oct 29 12:31:03 unused systemd: Reached target Remote File Systems (Pre). >Oct 29 12:31:03 unused systemd: Starting Remote File Systems. >Oct 29 12:31:03 unused systemd: Reached target Remote File Systems. >Oct 29 12:31:03 unused systemd: Starting Trigger Flushing of Journal to Persistent Storage... >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused systemd: Starting Virtualization daemon... >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused systemd: Starting Enable periodic update of entitlement certificates.... >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused systemd: Starting Crash recovery kernel arming... >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused systemd: Starting Postfix Mail Transport Agent... >Oct 29 12:31:04 unused systemd: Starting OpenSSH server daemon... >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused systemd: Started OpenSSH server daemon. >Oct 29 12:31:04 unused systemd: Starting /etc/rc.d/rc.local Compatibility... >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused systemd: Starting LSB: Starts the Spacewalk Daemon... >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused systemd: Started Enable periodic update of entitlement certificates.. >Oct 29 12:31:04 unused journal: Runtime journal is using 8.0M (max 189.5M, leaving 284.3M of free 1.8G, current limit 189.5M). >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused systemd: Started Trigger Flushing of Journal to Persistent Storage. >Oct 29 12:31:04 unused systemd: PID file /var/run/rhnsd.pid not readable (yet?) after start. >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused systemd: Failed to start LSB: Starts the Spacewalk Daemon. >Oct 29 12:31:04 unused systemd: Unit rhnsd.service entered failed state. >Oct 29 12:31:04 unused systemd: Starting Permit User Sessions... >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused rc.local: ens5: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500 >Oct 29 12:31:04 unused rc.local: ether 9a:4e:4f:50:51:52 txqueuelen 1000 (Ethernet) >Oct 29 12:31:04 unused rc.local: RX packets 147 bytes 9849 (9.6 KiB) >Oct 29 12:31:04 unused rc.local: RX errors 0 dropped 0 overruns 0 frame 0 >Oct 29 12:31:04 unused rc.local: TX packets 0 bytes 0 (0.0 B) >Oct 29 12:31:04 unused rc.local: TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >Oct 29 12:31:04 unused rc.local: lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 >Oct 29 12:31:04 unused rc.local: inet 127.0.0.1 netmask 255.0.0.0 >Oct 29 12:31:04 unused rc.local: inet6 ::1 prefixlen 128 scopeid 0x10<host> >Oct 29 12:31:04 unused rc.local: loop txqueuelen 0 (Local Loopback) >Oct 29 12:31:04 unused rc.local: RX packets 12 bytes 1296 (1.2 KiB) >Oct 29 12:31:04 unused rc.local: RX errors 0 dropped 0 overruns 0 frame 0 >Oct 29 12:31:04 unused rc.local: TX packets 12 bytes 1296 (1.2 KiB) >Oct 29 12:31:04 unused rc.local: TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused systemd: Started /etc/rc.d/rc.local Compatibility. >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused systemd: Started Permit User Sessions. >Oct 29 12:31:04 unused systemd: Starting Command Scheduler... >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused systemd: Started Command Scheduler. >Oct 29 12:31:04 unused systemd: Starting Job spooling tools... >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused systemd: Started Job spooling tools. >Oct 29 12:31:04 unused systemd: Starting GNOME Display Manager... >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused systemd: Starting Wait for Plymouth Boot Screen to Quit... >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused libvirtd: 2014-10-29 04:31:04.837+0000: 1282: info : libvirt version: 1.2.8, package: 4.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2014-09-26-08:45:32, x86-021.build.eng.bos.redhat.com) >Oct 29 12:31:04 unused libvirtd: 2014-10-29 04:31:04.837+0000: 1282: warning : virGetHostname:665 : getaddrinfo failed for 'unused': Name or service not known >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:04 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused NetworkManager[799]: <info> (ens5): link connected >Oct 29 12:31:05 unused NetworkManager[799]: <info> Auto-activating connection 'ens5'. >Oct 29 12:31:05 unused NetworkManager[799]: <info> Activation (ens5) starting connection 'ens5' >Oct 29 12:31:05 unused NetworkManager[799]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) scheduled... >Oct 29 12:31:05 unused NetworkManager[799]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) started... >Oct 29 12:31:05 unused NetworkManager[799]: <info> (ens5): device state change: disconnected -> prepare (reason 'none') [30 40 0] >Oct 29 12:31:05 unused NetworkManager[799]: <info> NetworkManager state is now CONNECTING >Oct 29 12:31:05 unused NetworkManager[799]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) scheduled... >Oct 29 12:31:05 unused NetworkManager[799]: <info> Activation (ens5) Stage 1 of 5 (Device Prepare) complete. >Oct 29 12:31:05 unused NetworkManager[799]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) starting... >Oct 29 12:31:05 unused NetworkManager[799]: <info> (ens5): device state change: prepare -> config (reason 'none') [40 50 0] >Oct 29 12:31:05 unused NetworkManager[799]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) successful. >Oct 29 12:31:05 unused NetworkManager[799]: <info> Activation (ens5) Stage 2 of 5 (Device Configure) complete. >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused kernel: e1000: ens5 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX >Oct 29 12:31:05 unused kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens5: link becomes ready >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused dbus[678]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.17" (uid=0 pid=1809 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.18" (uid=0 pid=1843 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:05 unused audispd: queue is full - dropping event >Oct 29 12:31:06 unused dbus-daemon: dbus[678]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.17" (uid=0 pid=1809 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.18" (uid=0 pid=1843 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Oct 29 12:31:06 unused systemd: Started GNOME Display Manager. >Oct 29 12:31:06 unused journal: libvirt version: 1.2.8, package: 4.el7 (Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>, 2014-09-26-08:45:32, x86-021.build.eng.bos.redhat.com) >Oct 29 12:31:06 unused journal: Module /usr/lib64/libvirt/connection-driver/libvirt_driver_lxc.so not accessible >Oct 29 12:31:06 unused setroubleshoot: Plugin Exception restorecon >Oct 29 12:31:06 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 12:31:06 unused systemd: Started Virtualization daemon. >Oct 29 12:31:06 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:07 unused NetworkManager[799]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) scheduled. >Oct 29 12:31:07 unused NetworkManager[799]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) started... >Oct 29 12:31:07 unused NetworkManager[799]: <info> (ens5): device state change: config -> ip-config (reason 'none') [50 70 0] >Oct 29 12:31:07 unused NetworkManager[799]: <info> Activation (ens5) Beginning DHCPv4 transaction (timeout in 45 seconds) >Oct 29 12:31:07 unused kdumpctl: kexec: loaded kdump kernel >Oct 29 12:31:07 unused kdumpctl: Starting kdump: [OK] >Oct 29 12:31:07 unused systemd: Started Crash recovery kernel arming. >Oct 29 12:31:07 unused NetworkManager[799]: <info> dhclient started with pid 2521 >Oct 29 12:31:07 unused NetworkManager[799]: <info> Activation (ens5) Stage 3 of 5 (IP Configure Start) complete. >Oct 29 12:31:07 unused systemd: Started Postfix Mail Transport Agent. >Oct 29 12:31:07 unused setroubleshoot: Plugin Exception restorecon_source >Oct 29 12:31:07 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 12:31:07 unused NetworkManager[799]: <info> (ens5): DHCPv4 state changed nbi -> preinit >Oct 29 12:31:07 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:07 unused dhclient[2521]: DHCPREQUEST on ens5 to 255.255.255.255 port 67 (xid=0x483d92ee) >Oct 29 12:31:07 unused dhclient[2521]: DHCPACK from 10.66.111.254 (xid=0x483d92ee) >Oct 29 12:31:07 unused NetworkManager[799]: <info> (ens5): DHCPv4 state changed preinit -> reboot >Oct 29 12:31:07 unused NetworkManager[799]: <info> address 10.66.110.85 >Oct 29 12:31:07 unused NetworkManager[799]: <info> plen 21 (255.255.248.0) >Oct 29 12:31:07 unused NetworkManager[799]: <info> gateway 10.66.111.254 >Oct 29 12:31:07 unused NetworkManager[799]: <info> server identifier 10.66.78.111 >Oct 29 12:31:07 unused NetworkManager[799]: <info> lease time 14400 >Oct 29 12:31:07 unused NetworkManager[799]: <info> nameserver '10.66.78.111' >Oct 29 12:31:07 unused NetworkManager[799]: <info> nameserver '10.66.78.117' >Oct 29 12:31:07 unused NetworkManager[799]: <info> nameserver '10.66.127.10' >Oct 29 12:31:07 unused NetworkManager[799]: <info> domain name 'englab.nay.redhat.com' >Oct 29 12:31:07 unused NetworkManager[799]: <info> domain name 'qe.lab.eng.nay.redhat.com' >Oct 29 12:31:07 unused NetworkManager[799]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Configure Commit) scheduled... >Oct 29 12:31:07 unused NetworkManager[799]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Commit) started... >Oct 29 12:31:07 unused NetworkManager[799]: <info> (ens5): device state change: ip-config -> ip-check (reason 'none') [70 80 0] >Oct 29 12:31:07 unused NetworkManager[799]: <info> Activation (ens5) Stage 5 of 5 (IPv4 Commit) complete. >Oct 29 12:31:07 unused avahi-daemon[649]: Joining mDNS multicast group on interface ens5.IPv4 with address 10.66.110.85. >Oct 29 12:31:07 unused NetworkManager[799]: <info> (ens5): device state change: ip-check -> secondaries (reason 'none') [80 90 0] >Oct 29 12:31:07 unused NetworkManager[799]: <info> (ens5): device state change: secondaries -> activated (reason 'none') [90 100 0] >Oct 29 12:31:07 unused NetworkManager[799]: <info> NetworkManager state is now CONNECTED_LOCAL >Oct 29 12:31:07 unused dhclient[2521]: bound to 10.66.110.85 -- renewal in 6223 seconds. >Oct 29 12:31:07 unused avahi-daemon[649]: New relevant interface ens5.IPv4 for mDNS. >Oct 29 12:31:07 unused avahi-daemon[649]: Registering new address record for 10.66.110.85 on ens5.IPv4. >Oct 29 12:31:07 unused NetworkManager[799]: <info> Policy set 'ens5' (ens5) as default for IPv4 routing and DNS. >Oct 29 12:31:07 unused NetworkManager[799]: <info> Activation (ens5) successful, device activated. >Oct 29 12:31:07 unused dbus[678]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Oct 29 12:31:07 unused dbus-daemon: dbus[678]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Oct 29 12:31:07 unused systemd: Starting Network Manager Script Dispatcher Service... >Oct 29 12:31:07 unused dbus-daemon: dbus[678]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Oct 29 12:31:07 unused dbus[678]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Oct 29 12:31:07 unused systemd: Started Network Manager Script Dispatcher Service. >Oct 29 12:31:07 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 12:31:07 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:07 unused systemd: Unit iscsi.service cannot be reloaded because it is inactive. >Oct 29 12:31:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 12:31:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:08 unused systemd: Started Wait for Plymouth Boot Screen to Quit. >Oct 29 12:31:08 unused systemd: Starting Serial Getty on ttyS0... >Oct 29 12:31:08 unused systemd: Started Serial Getty on ttyS0. >Oct 29 12:31:08 unused systemd: Starting Login Prompts. >Oct 29 12:31:08 unused systemd: Reached target Login Prompts. >Oct 29 12:31:08 unused systemd: Starting Multi-User System. >Oct 29 12:31:08 unused systemd: Reached target Multi-User System. >Oct 29 12:31:08 unused systemd: Starting Graphical Interface. >Oct 29 12:31:08 unused systemd: Reached target Graphical Interface. >Oct 29 12:31:08 unused systemd: Starting Update UTMP about System Runlevel Changes... >Oct 29 12:31:08 unused systemd: Started Stop Read-Ahead Data Collection 10s After Completed Startup. >Oct 29 12:31:08 unused systemd: Started Update UTMP about System Runlevel Changes. >Oct 29 12:31:08 unused systemd: Startup finished in 790ms (kernel) + 2.063s (initrd) + 24.823s (userspace) = 27.677s. >Oct 29 12:31:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 347105e4-dea3-4aea-ac34-ddfb6d094447 >Oct 29 12:31:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4232f3ec-5ccd-4850-ba76-4a70ff4565b6 >Oct 29 12:31:08 unused systemd: Starting user-42.slice. >Oct 29 12:31:08 unused systemd: Created slice user-42.slice. >Oct 29 12:31:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:08 unused systemd: Starting Session c1 of user gdm. >Oct 29 12:31:08 unused systemd-logind: New session c1 of user gdm. >Oct 29 12:31:08 unused systemd: Started Session c1 of user gdm. >Oct 29 12:31:08 unused systemd-logind: Linked /tmp/.X11-unix/X0 to /run/user/42/X11-display. >Oct 29 12:31:08 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 29 12:31:08 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 4adccd54-c737-4807-bd92-eb5e1216c6e0 >Oct 29 12:31:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:09 unused avahi-daemon[649]: Registering new address record for fe80::984e:4fff:fe50:5152 on ens5.*. >Oct 29 12:31:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f60195bb-d64d-4eb0-a8f4-cf8a2b920ac8 >Oct 29 12:31:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5ab16217-4ece-422d-83ed-2d510b7f6e4a >Oct 29 12:31:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l adc127d5-3ba3-4600-a18a-c60d41d563f5 >Oct 29 12:31:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 12:31:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 06db745f-002f-4e84-a79a-b463031747bc >Oct 29 12:31:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 06db745f-002f-4e84-a79a-b463031747bc >Oct 29 12:31:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:09 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 12:31:09 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8a2839f5-9652-4d11-b7f0-45cf9ee50720 >Oct 29 12:31:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 12:31:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 60f4d212-b110-415d-848d-272af19e66cd >Oct 29 12:31:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:10 unused dbus-daemon: dbus[678]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Oct 29 12:31:10 unused dbus[678]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Oct 29 12:31:10 unused systemd: Starting Daemon for power management... >Oct 29 12:31:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l bb129500-3477-472a-b1a1-1b7d123c1da8 >Oct 29 12:31:10 unused dbus[678]: [system] Successfully activated service 'org.freedesktop.UPower' >Oct 29 12:31:10 unused dbus-daemon: dbus[678]: [system] Successfully activated service 'org.freedesktop.UPower' >Oct 29 12:31:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:10 unused systemd: Started Daemon for power management. >Oct 29 12:31:10 unused gnome-session: (gnome-settings-daemon:2838): power-plugin-WARNING **: failed to turn the panel on: Display is not DPMS capable >Oct 29 12:31:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d95da5c3-8c53-450d-a9b2-dfb19b652de8 >Oct 29 12:31:10 unused NetworkManager[799]: <info> startup complete >Oct 29 12:31:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l db8f5c38-2bac-4875-a619-b204531cc812 >Oct 29 12:31:10 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:10 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 149193bb-28ed-4b94-9604-5e107a9da7e2 >Oct 29 12:31:11 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:11 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2003831-eae3-45bc-9b03-1dd96a73f949 >Oct 29 12:31:11 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:11 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d95da5c3-8c53-450d-a9b2-dfb19b652de8 >Oct 29 12:31:11 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:11 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 12:31:11 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:11 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5ab16217-4ece-422d-83ed-2d510b7f6e4a >Oct 29 12:31:11 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:11 unused dbus-daemon: dbus[678]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Oct 29 12:31:11 unused dbus[678]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Oct 29 12:31:11 unused systemd: Starting Manage, Install and Generate Color Profiles... >Oct 29 12:31:11 unused gnome-session: Entering running state >Oct 29 12:31:11 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 12:31:11 unused colord: Using config file /etc/colord.conf >Oct 29 12:31:11 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:11 unused colord: Using mapping database file /var/lib/colord/mapping.db >Oct 29 12:31:11 unused colord: Using device database file /var/lib/colord/storage.db >Oct 29 12:31:11 unused colord: loaded plugin libcd_plugin_camera.so >Oct 29 12:31:11 unused colord: loaded plugin libcd_plugin_scanner.so >Oct 29 12:31:11 unused colord: Daemon ready for requests >Oct 29 12:31:11 unused dbus-daemon: dbus[678]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Oct 29 12:31:11 unused dbus[678]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Oct 29 12:31:11 unused systemd: Started Manage, Install and Generate Color Profiles. >Oct 29 12:31:11 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 41005440-a55b-4233-93f3-db86ea99daba >Oct 29 12:31:11 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:11 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l af15d032-e5b6-477a-a4e0-d0db84c92e84 >Oct 29 12:31:11 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:12 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l af15d032-e5b6-477a-a4e0-d0db84c92e84 >Oct 29 12:31:12 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:12 unused colord: Profile added: icc-021ec903471f953c28c57ccde43f9134 >Oct 29 12:31:12 unused colord: Profile added: icc-7e1e684edc9a0671f5305d656d8cb8c9 >Oct 29 12:31:12 unused colord: Profile added: icc-0f6451e33e7342d0f90bb960912bb812 >Oct 29 12:31:12 unused colord: Profile added: icc-8f465237bb45ee1d16fdbd6b4038c719 >Oct 29 12:31:12 unused colord: Profile added: icc-8daff74b7142df23f76b3d5ef126bbf9 >Oct 29 12:31:12 unused colord: Profile added: icc-f16a3fe7a0d2f471188cf45202ae43ac >Oct 29 12:31:12 unused rtkit-daemon[675]: Successfully made thread 3084 of process 3084 (/usr/bin/pulseaudio) owned by '42' high priority at nice level -11. >Oct 29 12:31:12 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 75ef4f58-c198-49a6-9668-ae14c8a7007b >Oct 29 12:31:12 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:12 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b91b4263-e2c9-413f-9c5f-7869cacdb578 >Oct 29 12:31:12 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:12 unused dbus-daemon: dbus[678]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 29 12:31:12 unused dbus[678]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Oct 29 12:31:12 unused systemd: Starting Locale Service... >Oct 29 12:31:12 unused gnome-session: (gnome-settings-daemon:2838): color-plugin-WARNING **: failed to get edid: unable to get EDID for output >Oct 29 12:31:12 unused dbus-daemon: dbus[678]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 29 12:31:12 unused dbus[678]: [system] Successfully activated service 'org.freedesktop.locale1' >Oct 29 12:31:12 unused systemd: Started Locale Service. >Oct 29 12:31:12 unused colord: Device added: xrandr-Virtual-0 >Oct 29 12:31:12 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 97aea7ca-00fe-4e40-af8e-e0ec40282528 >Oct 29 12:31:12 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:12 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 94cf47a7-5a5c-405c-ab69-1601b787f238 >Oct 29 12:31:12 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:12 unused gnome-session: (gnome-settings-daemon:2838): color-plugin-WARNING **: unable to get EDID for xrandr-Virtual-0: unable to get EDID for output >Oct 29 12:31:12 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 05d5fa63-cbd7-453f-b673-c378b16914f0 >Oct 29 12:31:12 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:12 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 12:31:12 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:13 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 12:31:13 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:13 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 12:31:13 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:13 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8a64fd6d-c54b-4627-b7b5-44f0b14979dd >Oct 29 12:31:13 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:13 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 396a1310-4088-41c8-90a8-d43b4f19499c >Oct 29 12:31:13 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:13 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 396a1310-4088-41c8-90a8-d43b4f19499c >Oct 29 12:31:13 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:13 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::primary after class was initialised >Oct 29 12:31:13 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::index after class was initialised >Oct 29 12:31:13 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l d772382b-e332-4fba-8873-f558166b6023 >Oct 29 12:31:13 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:13 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2094586-a8f8-4bc1-af02-534887cfd2f4 >Oct 29 12:31:13 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:13 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2094586-a8f8-4bc1-af02-534887cfd2f4 >Oct 29 12:31:13 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:14 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0b13c0cf-312e-4166-b485-88d815f566fb >Oct 29 12:31:14 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:14 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b427ecb2-8229-4dc3-b9ee-ffea01dcd104 >Oct 29 12:31:14 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:14 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 12:31:14 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:14 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0e7f911c-862c-4a1b-bdef-924387d5c7e9 >Oct 29 12:31:14 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:14 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 12:31:14 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:14 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 04b4c9d6-e337-439c-bb70-255a7898dcb3 >Oct 29 12:31:14 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:14 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 12:31:14 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:14 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 5f10f707-7a84-461f-9e81-f835d4ea195d >Oct 29 12:31:14 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:15 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 12:31:15 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:15 unused gnome-session: JS LOG: GNOME Shell started at Wed Oct 29 2014 12:31:15 GMT+0800 (CST) >Oct 29 12:31:15 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 0e378e0b-9b3c-4d2f-84b9-ce2845665953 >Oct 29 12:31:15 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:15 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b94cfdf3-87b2-4b6e-abf5-837aee9d5e47 >Oct 29 12:31:15 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:15 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 12:31:15 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:15 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 829d18ca-3d16-4e5a-8496-a95d9ab10d6c >Oct 29 12:31:15 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:15 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 63dc4b7a-9372-4551-bd5d-9f0980157bc4 >Oct 29 12:31:15 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:15 unused dbus[678]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Oct 29 12:31:15 unused dbus-daemon: dbus[678]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Oct 29 12:31:15 unused systemd: Starting Fingerprint Authentication Daemon... >Oct 29 12:31:15 unused dbus-daemon: dbus[678]: [system] Successfully activated service 'net.reactivated.Fprint' >Oct 29 12:31:15 unused dbus[678]: [system] Successfully activated service 'net.reactivated.Fprint' >Oct 29 12:31:15 unused systemd: Started Fingerprint Authentication Daemon. >Oct 29 12:31:15 unused fprintd: Launching FprintObject >Oct 29 12:31:15 unused fprintd: ** Message: D-Bus service launched with name: net.reactivated.Fprint >Oct 29 12:31:15 unused fprintd: ** Message: entering main loop >Oct 29 12:31:15 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l be15d920-943b-4dae-ab10-813bdf4c9056 >Oct 29 12:31:15 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:16 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 12:31:16 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:16 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f31e2e16-ef9a-43df-bba1-a28015fc34cb >Oct 29 12:31:16 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:16 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 12:31:16 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:16 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l f31e2e16-ef9a-43df-bba1-a28015fc34cb >Oct 29 12:31:16 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:16 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 12:31:16 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:16 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 12:31:16 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:16 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l b2c4bc1f-5dab-4aa5-8124-887fd0554b8c >Oct 29 12:31:16 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:16 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 12:31:16 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:17 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 12:31:17 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:17 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 88a7869a-040a-4f0e-80c5-b6a4e8755bb3 >Oct 29 12:31:17 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:17 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 12:31:17 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:17 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 6d8e5e8d-a168-41c9-b097-0c20c6015338 >Oct 29 12:31:17 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:17 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l dc7e7c9b-7e67-4b25-821f-418ef1def3e4 >Oct 29 12:31:17 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:17 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 12:31:17 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:17 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 12:31:17 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:18 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l ddd480c7-ed9f-48c1-9c23-37f46c756943 >Oct 29 12:31:18 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:18 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 8dd8c574-fc63-4b6f-9f6c-45c2df7870d4 >Oct 29 12:31:18 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:18 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 12:31:18 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:18 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 3ed0fa73-53ef-48c0-bb88-c1fd8f856461 >Oct 29 12:31:18 unused python: SELinux is preventing /usr/bin/lsmd from getattr access on the file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that lsmd should be allowed getattr access on the file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep lsmd /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:31:18 unused setroubleshoot: SELinux is preventing /usr/bin/lsmd from getattr access on the file . For complete SELinux messages. run sealert -l 272b2aef-c58c-46e6-8605-27aa5f1916e7 >Oct 29 12:31:18 unused dbus-daemon: Exception in thread Thread-1 (most likely raised during interpreter shutdown):string index out of range >Oct 29 12:31:18 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 29 12:31:31 unused systemd: Starting user-1000.slice. >Oct 29 12:31:31 unused systemd: Created slice user-1000.slice. >Oct 29 12:31:31 unused systemd: Starting Session 1 of user licong. >Oct 29 12:31:31 unused systemd: Started Session 1 of user licong. >Oct 29 12:31:31 unused systemd-logind: New session 1 of user licong. >Oct 29 12:31:31 unused systemd-logind: Linked /tmp/.X11-unix/X0 to /run/user/1000/X11-display. >Oct 29 12:31:32 unused gnome-session: (gnome-settings-daemon:2838): GLib-GIO-WARNING **: Error releasing name org.gnome.SettingsDaemon: The connection is closed >Oct 29 12:31:32 unused gnome-session: g_dbus_connection_real_closed: Remote peer vanished with error: Underlying GIOStream returned 0 bytes on an async read (g-io-error-quark, 0). Exiting. >Oct 29 12:31:32 unused colord: device removed: xrandr-Virtual-0 >Oct 29 12:31:33 unused gnome-session: GNOME_KEYRING_CONTROL=/run/user/1000/keyring-FYciVo >Oct 29 12:31:33 unused gnome-session: GPG_AGENT_INFO=/run/user/1000/keyring-FYciVo/gpg:0:1 >Oct 29 12:31:33 unused gnome-session: GNOME_KEYRING_CONTROL=/run/user/1000/keyring-FYciVo >Oct 29 12:31:33 unused gnome-session: GPG_AGENT_INFO=/run/user/1000/keyring-FYciVo/gpg:0:1 >Oct 29 12:31:33 unused gnome-session: GNOME_KEYRING_CONTROL=/run/user/1000/keyring-FYciVo >Oct 29 12:31:33 unused gnome-session: GPG_AGENT_INFO=/run/user/1000/keyring-FYciVo/gpg:0:1 >Oct 29 12:31:33 unused gnome-session: GNOME_KEYRING_CONTROL=/run/user/1000/keyring-FYciVo >Oct 29 12:31:33 unused gnome-session: GPG_AGENT_INFO=/run/user/1000/keyring-FYciVo/gpg:0:1 >Oct 29 12:31:33 unused gnome-session: SSH_AUTH_SOCK=/run/user/1000/keyring-FYciVo/ssh >Oct 29 12:31:33 unused kernel: fuse init (API version 7.22) >Oct 29 12:31:33 unused systemd: Mounting FUSE Control File System... >Oct 29 12:31:33 unused systemd: Mounted FUSE Control File System. >Oct 29 12:31:33 unused gnome-session: (gnome-settings-daemon:3802): power-plugin-WARNING **: failed to turn the panel on: Display is not DPMS capable >Oct 29 12:31:33 unused dbus-daemon: dbus[678]: [system] Activating via systemd: service name='org.freedesktop.UDisks2' unit='udisks2.service' >Oct 29 12:31:33 unused dbus[678]: [system] Activating via systemd: service name='org.freedesktop.UDisks2' unit='udisks2.service' >Oct 29 12:31:33 unused systemd: Starting Disk Manager... >Oct 29 12:31:33 unused udisksd[3847]: udisks daemon version 2.1.2 starting >Oct 29 12:31:33 unused dbus-daemon: dbus[678]: [system] Successfully activated service 'org.freedesktop.UDisks2' >Oct 29 12:31:33 unused dbus[678]: [system] Successfully activated service 'org.freedesktop.UDisks2' >Oct 29 12:31:33 unused udisksd[3847]: Acquired the name org.freedesktop.UDisks2 on the system message bus >Oct 29 12:31:33 unused systemd: Started Disk Manager. >Oct 29 12:31:34 unused goa[3872]: goa-daemon version 3.8.5 starting [main.c:113, main()] >Oct 29 12:31:34 unused goa[3872]: GoaKerberosIdentityManager: Using polling for change notification for credential cache type 'KEYRING' [goakerberosidentitymanager.c:1386, monitor_credentials_cache()] >Oct 29 12:31:34 unused dbus-daemon: dbus[678]: [system] Activating service name='org.freedesktop.PackageKit' (using servicehelper) >Oct 29 12:31:34 unused dbus[678]: [system] Activating service name='org.freedesktop.PackageKit' (using servicehelper) >Oct 29 12:31:34 unused rtkit-daemon[675]: Successfully made thread 3904 of process 3904 (/usr/bin/pulseaudio) owned by '1000' high priority at nice level -11. >Oct 29 12:31:34 unused dbus-daemon: dbus[678]: [system] Successfully activated service 'org.freedesktop.PackageKit' >Oct 29 12:31:34 unused dbus[678]: [system] Successfully activated service 'org.freedesktop.PackageKit' >Oct 29 12:31:34 unused dbus-daemon: dbus[678]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' >Oct 29 12:31:34 unused dbus[678]: [system] Activating via systemd: service name='org.bluez' unit='dbus-org.bluez.service' >Oct 29 12:31:34 unused systemd: Starting Bluetooth service... >Oct 29 12:31:34 unused bluetoothd: bluetoothd[3913]: Bluetooth daemon 4.101 >Oct 29 12:31:34 unused bluetoothd[3913]: Bluetooth daemon 4.101 >Oct 29 12:31:34 unused dbus-daemon: dbus[678]: [system] Successfully activated service 'org.bluez' >Oct 29 12:31:34 unused dbus[678]: [system] Successfully activated service 'org.bluez' >Oct 29 12:31:34 unused bluetoothd: bluetoothd[3913]: Starting SDP server >Oct 29 12:31:34 unused bluetoothd[3913]: Starting SDP server >Oct 29 12:31:34 unused systemd: Started Bluetooth service. >Oct 29 12:31:34 unused kernel: Bluetooth: Core ver 2.16 >Oct 29 12:31:34 unused kernel: NET: Registered protocol family 31 >Oct 29 12:31:34 unused kernel: Bluetooth: HCI device and connection manager initialized >Oct 29 12:31:34 unused kernel: Bluetooth: HCI socket layer initialized >Oct 29 12:31:34 unused kernel: Bluetooth: L2CAP socket layer initialized >Oct 29 12:31:34 unused kernel: Bluetooth: SCO socket layer initialized >Oct 29 12:31:34 unused kernel: Bluetooth: BNEP (Ethernet Emulation) ver 1.3 >Oct 29 12:31:34 unused kernel: Bluetooth: BNEP filters: protocol multicast >Oct 29 12:31:34 unused kernel: Bluetooth: BNEP socket layer initialized >Oct 29 12:31:34 unused bluetoothd: bluetoothd[3913]: Parsing /etc/bluetooth/input.conf failed: No such file or directory >Oct 29 12:31:34 unused bluetoothd[3913]: Parsing /etc/bluetooth/input.conf failed: No such file or directory >Oct 29 12:31:34 unused bluetoothd: bluetoothd[3913]: Bluetooth Management interface initialized >Oct 29 12:31:34 unused bluetoothd[3913]: Bluetooth Management interface initialized >Oct 29 12:31:34 unused NetworkManager[799]: <info> use BlueZ version 4 >Oct 29 12:31:34 unused rtkit-daemon[675]: Successfully made thread 3921 of process 3921 (/usr/bin/pulseaudio) owned by '1000' high priority at nice level -11. >Oct 29 12:31:34 unused pulseaudio[3921]: [pulseaudio] pid.c: Daemon already running. >Oct 29 12:31:34 unused gnome-session: (gnome-settings-daemon:3802): color-plugin-WARNING **: failed to get edid: unable to get EDID for output >Oct 29 12:31:34 unused colord: Device added: xrandr-Virtual-0 >Oct 29 12:31:34 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::primary after class was initialised >Oct 29 12:31:34 unused gnome-session: Window manager warning: Log level 16: Attempt to add property Gjs_MonitorConstraint::index after class was initialised >Oct 29 12:31:34 unused gnome-session: (gnome-settings-daemon:3802): color-plugin-WARNING **: unable to get EDID for xrandr-Virtual-0: unable to get EDID for output >Oct 29 12:31:35 unused NetworkManager[799]: <info> NetworkManager state is now CONNECTED_GLOBAL >Oct 29 12:31:35 unused gnome-session: JS LOG: GNOME Shell started at Wed Oct 29 2014 12:31:35 GMT+0800 (CST) >Oct 29 12:31:36 unused gnome-session: Failed to play sound: File or data not found >Oct 29 12:31:36 unused gnome-session: Entering running state >Oct 29 12:31:36 unused gnome-session: Tracker-Message: Importing config file to GSettings >Oct 29 12:31:36 unused gnome-session: Tracker-Message: Importing config file to GSettings >Oct 29 12:31:36 unused gnome-session: (tracker-store:4122): Tracker-CRITICAL **: D-Bus service name:'org.freedesktop.Tracker1' is already taken, perhaps the daemon is already running? >Oct 29 12:31:36 unused gnome-session: Tracker-Message: Importing config file to GSettings >Oct 29 12:31:37 unused dbus-daemon: dbus[678]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' >Oct 29 12:31:37 unused dbus[678]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' >Oct 29 12:31:37 unused systemd: Starting Hostname Service... >Oct 29 12:31:37 unused dbus-daemon: dbus[678]: [system] Successfully activated service 'org.freedesktop.hostname1' >Oct 29 12:31:37 unused dbus[678]: [system] Successfully activated service 'org.freedesktop.hostname1' >Oct 29 12:31:37 unused systemd: Started Hostname Service. >Oct 29 12:31:37 unused gnome-session: (tracker-miner-fs:4116): GLib-CRITICAL **: g_timer_continue: assertion 'timer->active == FALSE' failed >Oct 29 12:31:45 unused fprintd: ** Message: No devices in use, exit >Oct 29 12:31:52 unused systemd-logind: Removed session c1. >Oct 29 12:31:56 unused systemd: Starting user-0.slice. >Oct 29 12:31:56 unused systemd: Created slice user-0.slice. >Oct 29 12:31:56 unused systemd: Starting Session 2 of user root. >Oct 29 12:31:56 unused systemd: Started Session 2 of user root. >Oct 29 12:31:56 unused systemd-logind: New session 2 of user root. >Oct 29 12:34:03 unused kernel: sr 1:0:1:0: device reset >Oct 29 12:34:03 unused kernel: sr 1:0:1:0: Device offlined - not ready after error recovery >Oct 29 12:34:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:05 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:08 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:10 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:12 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:13 unused chronyd[664]: Selected source 10.5.26.10 >Oct 29 12:34:14 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:16 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:18 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:20 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:22 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:24 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:26 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:28 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:30 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:32 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:34 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:36 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:38 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:40 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:42 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:44 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:46 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:49 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:51 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:53 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:55 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:56 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:56 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:56 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:56 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:34:58 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:00 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:02 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:04 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:06 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:08 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:11 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:13 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:15 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:17 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:17 unused chronyd[664]: Selected source 10.66.127.10 >Oct 29 12:35:19 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:21 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:23 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:25 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:27 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:28 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:28 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:28 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:28 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:30 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:32 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:34 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:36 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:37 unused dbus-daemon: dbus[678]: [system] Activating service name='com.redhat.SubscriptionManager' (using servicehelper) >Oct 29 12:35:37 unused dbus[678]: [system] Activating service name='com.redhat.SubscriptionManager' (using servicehelper) >Oct 29 12:35:37 unused dbus-daemon: dbus[678]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 12:35:37 unused dbus[678]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 12:35:37 unused dbus-daemon: dbus[678]: [system] Successfully activated service 'com.redhat.SubscriptionManager' >Oct 29 12:35:37 unused dbus[678]: [system] Successfully activated service 'com.redhat.SubscriptionManager' >Oct 29 12:35:38 unused dbus-daemon: dbus[678]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 12:35:38 unused dbus[678]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 12:35:38 unused journal: Suppressed 2732 messages from /system.slice/dbus.service >Oct 29 12:35:38 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:39 unused setroubleshoot: Plugin Exception restorecon_source >Oct 29 12:35:39 unused setroubleshoot: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . For complete SELinux messages. run sealert -l 4a8ad880-7062-4605-9b9d-8c4c4afb7b20 >Oct 29 12:35:39 unused python: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that prelink should be allowed setattr access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:35:39 unused setroubleshoot: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . For complete SELinux messages. run sealert -l 4a8ad880-7062-4605-9b9d-8c4c4afb7b20 >Oct 29 12:35:39 unused python: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that prelink should be allowed setattr access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:35:41 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:43 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:45 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:47 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:47 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:47 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:47 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:47 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:49 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 29 12:35:49 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:51 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:54 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:56 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:35:58 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:00 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:02 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:04 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:06 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:08 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:10 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:12 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:14 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:16 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:18 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:20 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:22 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:24 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:26 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:28 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:30 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:32 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:34 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:37 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:39 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:41 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:43 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:45 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:47 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:49 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:51 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:53 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:55 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:57 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:36:59 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:01 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:05 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:07 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:09 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:11 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:13 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:15 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:17 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:20 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:22 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:24 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:26 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:27 unused chronyd[664]: Selected source 10.5.26.10 >Oct 29 12:37:28 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:30 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:32 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:34 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:36 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:38 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:40 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:42 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:44 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:46 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:48 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:50 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:52 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:54 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:56 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:37:58 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:01 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:05 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:07 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:09 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:11 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:13 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:15 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:17 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:19 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:21 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:23 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:25 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:27 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:29 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:31 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:33 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:35 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:37 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:39 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:41 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:44 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:46 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:48 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:50 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:52 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:54 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:56 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:38:58 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:00 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:02 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:04 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:06 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:08 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:10 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:12 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:14 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:16 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:18 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:20 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:22 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:24 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:27 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:29 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:31 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:33 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:35 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:37 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:39 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:41 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:43 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:45 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:47 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:49 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:51 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:53 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:55 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:57 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:39:59 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:01 unused dbus-daemon: dbus[678]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 12:40:01 unused dbus[678]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Oct 29 12:40:01 unused systemd: Starting Session 3 of user root. >Oct 29 12:40:01 unused systemd: Started Session 3 of user root. >Oct 29 12:40:01 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:02 unused dbus-daemon: dbus[678]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 12:40:02 unused dbus[678]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Oct 29 12:40:03 unused setroubleshoot: Plugin Exception restorecon_source >Oct 29 12:40:03 unused setroubleshoot: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . For complete SELinux messages. run sealert -l 48fca7c8-976d-46e5-9bdc-8be5be60840d >Oct 29 12:40:03 unused python: SELinux is preventing /usr/sbin/prelink from setattr access on the fifo_file . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that prelink should be allowed setattr access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > > >Oct 29 12:40:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:05 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:07 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:10 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:12 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:13 unused dbus-daemon: 'list' object has no attribute 'split' >Oct 29 12:40:14 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:16 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:18 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:20 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:22 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:24 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:26 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:28 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:30 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:32 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:34 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:36 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:38 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:40 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:42 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:44 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:46 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:48 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:50 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:53 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:55 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:57 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:40:59 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:01 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:05 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:07 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:09 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:11 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:13 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:15 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:17 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:19 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:21 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:23 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:25 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:27 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:29 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:31 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:33 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:36 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:38 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:40 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:42 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:44 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:46 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:48 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:50 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:52 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:54 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:56 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:41:58 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:00 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:02 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:04 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:06 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:08 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:10 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:12 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:14 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:17 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:19 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:21 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:23 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:25 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:27 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:29 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:31 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:33 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:35 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:37 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:39 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:41 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:43 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:45 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:47 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:49 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:51 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:53 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:55 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:42:57 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:00 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:02 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:04 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:06 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:08 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:10 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:12 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:14 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:16 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:18 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:20 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:22 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:24 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:26 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:28 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:30 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:32 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:34 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:36 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:38 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:40 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:43 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:45 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:47 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:49 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:51 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:53 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:55 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:57 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:43:59 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:01 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:03 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:05 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:07 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:09 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:11 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:13 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:15 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:17 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:19 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:21 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:23 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:26 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:28 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:30 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:32 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:34 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:36 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:38 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:40 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:42 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:44 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:46 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:48 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:50 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:52 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:54 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:56 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:44:58 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:00 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:02 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:04 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:06 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:09 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:11 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:13 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:15 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:17 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:19 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:21 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:23 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:25 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:27 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:29 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:31 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:33 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:35 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:37 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:39 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:40 unused systemd: Starting Cleanup of Temporary Directories... >Oct 29 12:45:40 unused systemd: Started Cleanup of Temporary Directories. >Oct 29 12:45:41 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:43 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:45 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:47 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:49 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:52 unused kernel: sr 1:0:1:0: rejecting I/O to offline device >Oct 29 12:45:54 unused kernel: sr 1:0:1:0: rejecting I/O to offline device
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1158310
: 951626 |
951678