Dec 3 01:40:57 localhost kernel: Linux version 5.14.0-284.11.1.el9_2.x86_64 (mockbuild@x86-vm-09.build.eng.bos.redhat.com) (gcc (GCC) 11.3.1 20221121 (Red Hat 11.3.1-4), GNU ld version 2.35.2-37.el9) #1 SMP PREEMPT_DYNAMIC Wed Apr 12 10:45:03 EDT 2023 Dec 3 01:40:57 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Dec 3 01:40:57 localhost kernel: Command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Dec 3 01:40:57 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 3 01:40:57 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 3 01:40:57 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 3 01:40:57 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 3 01:40:57 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 3 01:40:57 localhost kernel: signal: max sigframe size: 1776 Dec 3 01:40:57 localhost kernel: BIOS-provided physical RAM map: Dec 3 01:40:57 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 3 01:40:57 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 3 01:40:57 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 3 01:40:57 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Dec 3 01:40:57 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Dec 3 01:40:57 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 3 01:40:57 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 3 01:40:57 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000043fffffff] usable Dec 3 01:40:57 localhost kernel: NX (Execute Disable) protection: active Dec 3 01:40:57 localhost kernel: SMBIOS 2.8 present. Dec 3 01:40:57 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Dec 3 01:40:57 localhost kernel: Hypervisor detected: KVM Dec 3 01:40:57 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 3 01:40:57 localhost kernel: kvm-clock: using sched offset of 1944109954 cycles Dec 3 01:40:57 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 3 01:40:57 localhost kernel: tsc: Detected 2799.998 MHz processor Dec 3 01:40:57 localhost kernel: last_pfn = 0x440000 max_arch_pfn = 0x400000000 Dec 3 01:40:57 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 3 01:40:57 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Dec 3 01:40:57 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Dec 3 01:40:57 localhost kernel: Using GB pages for direct mapping Dec 3 01:40:57 localhost kernel: RAMDISK: [mem 0x2eef4000-0x33771fff] Dec 3 01:40:57 localhost kernel: ACPI: Early table checksum verification disabled Dec 3 01:40:57 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Dec 3 01:40:57 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 3 01:40:57 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 3 01:40:57 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 3 01:40:57 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Dec 3 01:40:57 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 3 01:40:57 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 3 01:40:57 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Dec 3 01:40:57 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Dec 3 01:40:57 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Dec 3 01:40:57 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Dec 3 01:40:57 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Dec 3 01:40:57 localhost kernel: No NUMA configuration found Dec 3 01:40:57 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000043fffffff] Dec 3 01:40:57 localhost kernel: NODE_DATA(0) allocated [mem 0x43ffd3000-0x43fffdfff] Dec 3 01:40:57 localhost kernel: Reserving 256MB of memory at 2800MB for crashkernel (System RAM: 16383MB) Dec 3 01:40:57 localhost kernel: Zone ranges: Dec 3 01:40:57 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 3 01:40:57 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 3 01:40:57 localhost kernel: Normal [mem 0x0000000100000000-0x000000043fffffff] Dec 3 01:40:57 localhost kernel: Device empty Dec 3 01:40:57 localhost kernel: Movable zone start for each node Dec 3 01:40:57 localhost kernel: Early memory node ranges Dec 3 01:40:57 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 3 01:40:57 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Dec 3 01:40:57 localhost kernel: node 0: [mem 0x0000000100000000-0x000000043fffffff] Dec 3 01:40:57 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000043fffffff] Dec 3 01:40:57 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 3 01:40:57 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 3 01:40:57 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Dec 3 01:40:57 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Dec 3 01:40:57 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 3 01:40:57 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 3 01:40:57 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 3 01:40:57 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 3 01:40:57 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 3 01:40:57 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 3 01:40:57 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 3 01:40:57 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 3 01:40:57 localhost kernel: TSC deadline timer available Dec 3 01:40:57 localhost kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs Dec 3 01:40:57 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Dec 3 01:40:57 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Dec 3 01:40:57 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Dec 3 01:40:57 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Dec 3 01:40:57 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Dec 3 01:40:57 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Dec 3 01:40:57 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Dec 3 01:40:57 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Dec 3 01:40:57 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Dec 3 01:40:57 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Dec 3 01:40:57 localhost kernel: Booting paravirtualized kernel on KVM Dec 3 01:40:57 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 3 01:40:57 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Dec 3 01:40:57 localhost kernel: percpu: Embedded 55 pages/cpu s188416 r8192 d28672 u262144 Dec 3 01:40:57 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Dec 3 01:40:57 localhost kernel: Fallback order for Node 0: 0 Dec 3 01:40:57 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 4128475 Dec 3 01:40:57 localhost kernel: Policy zone: Normal Dec 3 01:40:57 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Dec 3 01:40:57 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64", will be passed to user space. Dec 3 01:40:57 localhost kernel: Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Dec 3 01:40:57 localhost kernel: Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 3 01:40:57 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 3 01:40:57 localhost kernel: software IO TLB: area num 8. Dec 3 01:40:57 localhost kernel: Memory: 2826284K/16776676K available (14342K kernel code, 5536K rwdata, 10180K rodata, 2792K init, 7524K bss, 741268K reserved, 0K cma-reserved) Dec 3 01:40:57 localhost kernel: random: get_random_u64 called from kmem_cache_open+0x1e/0x210 with crng_init=0 Dec 3 01:40:57 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Dec 3 01:40:57 localhost kernel: ftrace: allocating 44803 entries in 176 pages Dec 3 01:40:57 localhost kernel: ftrace: allocated 176 pages with 3 groups Dec 3 01:40:57 localhost kernel: Dynamic Preempt: voluntary Dec 3 01:40:57 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Dec 3 01:40:57 localhost kernel: rcu: #011RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Dec 3 01:40:57 localhost kernel: #011Trampoline variant of Tasks RCU enabled. Dec 3 01:40:57 localhost kernel: #011Rude variant of Tasks RCU enabled. Dec 3 01:40:57 localhost kernel: #011Tracing variant of Tasks RCU enabled. Dec 3 01:40:57 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 3 01:40:57 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Dec 3 01:40:57 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Dec 3 01:40:57 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Dec 3 01:40:57 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Dec 3 01:40:57 localhost kernel: random: crng init done (trusting CPU's manufacturer) Dec 3 01:40:57 localhost kernel: Console: colour VGA+ 80x25 Dec 3 01:40:57 localhost kernel: printk: console [tty0] enabled Dec 3 01:40:57 localhost kernel: printk: console [ttyS0] enabled Dec 3 01:40:57 localhost kernel: ACPI: Core revision 20211217 Dec 3 01:40:57 localhost kernel: APIC: Switch to symmetric I/O mode setup Dec 3 01:40:57 localhost kernel: x2apic enabled Dec 3 01:40:57 localhost kernel: Switched APIC routing to physical x2apic. Dec 3 01:40:57 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 3 01:40:57 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Dec 3 01:40:57 localhost kernel: pid_max: default: 32768 minimum: 301 Dec 3 01:40:57 localhost kernel: LSM: Security Framework initializing Dec 3 01:40:57 localhost kernel: Yama: becoming mindful. Dec 3 01:40:57 localhost kernel: SELinux: Initializing. Dec 3 01:40:57 localhost kernel: LSM support for eBPF active Dec 3 01:40:57 localhost kernel: Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 3 01:40:57 localhost kernel: Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 3 01:40:57 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 3 01:40:57 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 3 01:40:57 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 3 01:40:57 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 3 01:40:57 localhost kernel: Spectre V2 : Mitigation: Retpolines Dec 3 01:40:57 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 3 01:40:57 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 3 01:40:57 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 3 01:40:57 localhost kernel: RETBleed: Mitigation: untrained return thunk Dec 3 01:40:57 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 3 01:40:57 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Dec 3 01:40:57 localhost kernel: Freeing SMP alternatives memory: 36K Dec 3 01:40:57 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 3 01:40:57 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues. Dec 3 01:40:57 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Dec 3 01:40:57 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Dec 3 01:40:57 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Dec 3 01:40:57 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 3 01:40:57 localhost kernel: ... version: 0 Dec 3 01:40:57 localhost kernel: ... bit width: 48 Dec 3 01:40:57 localhost kernel: ... generic registers: 6 Dec 3 01:40:57 localhost kernel: ... value mask: 0000ffffffffffff Dec 3 01:40:57 localhost kernel: ... max period: 00007fffffffffff Dec 3 01:40:57 localhost kernel: ... fixed-purpose events: 0 Dec 3 01:40:57 localhost kernel: ... event mask: 000000000000003f Dec 3 01:40:57 localhost kernel: rcu: Hierarchical SRCU implementation. Dec 3 01:40:57 localhost kernel: rcu: #011Max phase no-delay instances is 400. Dec 3 01:40:57 localhost kernel: smp: Bringing up secondary CPUs ... Dec 3 01:40:57 localhost kernel: x86: Booting SMP configuration: Dec 3 01:40:57 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Dec 3 01:40:57 localhost kernel: smp: Brought up 1 node, 8 CPUs Dec 3 01:40:57 localhost kernel: smpboot: Max logical packages: 8 Dec 3 01:40:57 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Dec 3 01:40:57 localhost kernel: node 0 deferred pages initialised in 22ms Dec 3 01:40:57 localhost kernel: devtmpfs: initialized Dec 3 01:40:57 localhost kernel: x86/mm: Memory block size: 128MB Dec 3 01:40:57 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 3 01:40:57 localhost kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Dec 3 01:40:57 localhost kernel: pinctrl core: initialized pinctrl subsystem Dec 3 01:40:57 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 3 01:40:57 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations Dec 3 01:40:57 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 3 01:40:57 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 3 01:40:57 localhost kernel: audit: initializing netlink subsys (disabled) Dec 3 01:40:57 localhost kernel: audit: type=2000 audit(1764744056.184:1): state=initialized audit_enabled=0 res=1 Dec 3 01:40:57 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Dec 3 01:40:57 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 3 01:40:57 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Dec 3 01:40:57 localhost kernel: cpuidle: using governor menu Dec 3 01:40:57 localhost kernel: HugeTLB: can optimize 4095 vmemmap pages for hugepages-1048576kB Dec 3 01:40:57 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 3 01:40:57 localhost kernel: PCI: Using configuration type 1 for base access Dec 3 01:40:57 localhost kernel: PCI: Using configuration type 1 for extended access Dec 3 01:40:57 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 3 01:40:57 localhost kernel: HugeTLB: can optimize 7 vmemmap pages for hugepages-2048kB Dec 3 01:40:57 localhost kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 3 01:40:57 localhost kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 3 01:40:57 localhost kernel: cryptd: max_cpu_qlen set to 1000 Dec 3 01:40:57 localhost kernel: ACPI: Added _OSI(Module Device) Dec 3 01:40:57 localhost kernel: ACPI: Added _OSI(Processor Device) Dec 3 01:40:57 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 3 01:40:57 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 3 01:40:57 localhost kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 3 01:40:57 localhost kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 3 01:40:57 localhost kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 3 01:40:57 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 3 01:40:57 localhost kernel: ACPI: Interpreter enabled Dec 3 01:40:57 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Dec 3 01:40:57 localhost kernel: ACPI: Using IOAPIC for interrupt routing Dec 3 01:40:57 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 3 01:40:57 localhost kernel: PCI: Using E820 reservations for host bridge windows Dec 3 01:40:57 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Dec 3 01:40:57 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 3 01:40:57 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Dec 3 01:40:57 localhost kernel: acpiphp: Slot [3] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [4] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [5] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [6] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [7] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [8] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [9] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [10] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [11] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [12] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [13] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [14] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [15] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [16] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [17] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [18] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [19] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [20] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [21] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [22] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [23] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [24] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [25] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [26] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [27] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [28] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [29] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [30] registered Dec 3 01:40:57 localhost kernel: acpiphp: Slot [31] registered Dec 3 01:40:57 localhost kernel: PCI host bridge to bus 0000:00 Dec 3 01:40:57 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 3 01:40:57 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 3 01:40:57 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 3 01:40:57 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 3 01:40:57 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x440000000-0x4bfffffff window] Dec 3 01:40:57 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 3 01:40:57 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 3 01:40:57 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 3 01:40:57 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Dec 3 01:40:57 localhost kernel: pci 0000:00:01.1: reg 0x20: [io 0xc140-0xc14f] Dec 3 01:40:57 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 3 01:40:57 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 3 01:40:57 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 3 01:40:57 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 3 01:40:57 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Dec 3 01:40:57 localhost kernel: pci 0000:00:01.2: reg 0x20: [io 0xc100-0xc11f] Dec 3 01:40:57 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 3 01:40:57 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Dec 3 01:40:57 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Dec 3 01:40:57 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Dec 3 01:40:57 localhost kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Dec 3 01:40:57 localhost kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Dec 3 01:40:57 localhost kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Dec 3 01:40:57 localhost kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Dec 3 01:40:57 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 3 01:40:57 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 3 01:40:57 localhost kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Dec 3 01:40:57 localhost kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Dec 3 01:40:57 localhost kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Dec 3 01:40:57 localhost kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Dec 3 01:40:57 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 3 01:40:57 localhost kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 3 01:40:57 localhost kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Dec 3 01:40:57 localhost kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Dec 3 01:40:57 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Dec 3 01:40:57 localhost kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Dec 3 01:40:57 localhost kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Dec 3 01:40:57 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Dec 3 01:40:57 localhost kernel: pci 0000:00:06.0: reg 0x10: [io 0xc120-0xc13f] Dec 3 01:40:57 localhost kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Dec 3 01:40:57 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 3 01:40:57 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 3 01:40:57 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 3 01:40:57 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 3 01:40:57 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 3 01:40:57 localhost kernel: iommu: Default domain type: Translated Dec 3 01:40:57 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 3 01:40:57 localhost kernel: SCSI subsystem initialized Dec 3 01:40:57 localhost kernel: ACPI: bus type USB registered Dec 3 01:40:57 localhost kernel: usbcore: registered new interface driver usbfs Dec 3 01:40:57 localhost kernel: usbcore: registered new interface driver hub Dec 3 01:40:57 localhost kernel: usbcore: registered new device driver usb Dec 3 01:40:57 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Dec 3 01:40:57 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 3 01:40:57 localhost kernel: PTP clock support registered Dec 3 01:40:57 localhost kernel: EDAC MC: Ver: 3.0.0 Dec 3 01:40:57 localhost kernel: NetLabel: Initializing Dec 3 01:40:57 localhost kernel: NetLabel: domain hash size = 128 Dec 3 01:40:57 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Dec 3 01:40:57 localhost kernel: NetLabel: unlabeled traffic allowed by default Dec 3 01:40:57 localhost kernel: PCI: Using ACPI for IRQ routing Dec 3 01:40:57 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Dec 3 01:40:57 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Dec 3 01:40:57 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 3 01:40:57 localhost kernel: vgaarb: loaded Dec 3 01:40:57 localhost kernel: clocksource: Switched to clocksource kvm-clock Dec 3 01:40:57 localhost kernel: VFS: Disk quotas dquot_6.6.0 Dec 3 01:40:57 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 3 01:40:57 localhost kernel: pnp: PnP ACPI init Dec 3 01:40:57 localhost kernel: pnp: PnP ACPI: found 5 devices Dec 3 01:40:57 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 3 01:40:57 localhost kernel: NET: Registered PF_INET protocol family Dec 3 01:40:57 localhost kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 3 01:40:57 localhost kernel: tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) Dec 3 01:40:57 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 3 01:40:57 localhost kernel: TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 3 01:40:57 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 3 01:40:57 localhost kernel: TCP: Hash tables configured (established 131072 bind 65536) Dec 3 01:40:57 localhost kernel: MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) Dec 3 01:40:57 localhost kernel: UDP hash table entries: 8192 (order: 6, 262144 bytes, linear) Dec 3 01:40:57 localhost kernel: UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear) Dec 3 01:40:57 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 3 01:40:57 localhost kernel: NET: Registered PF_XDP protocol family Dec 3 01:40:57 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 3 01:40:57 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 3 01:40:57 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 3 01:40:57 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Dec 3 01:40:57 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x440000000-0x4bfffffff window] Dec 3 01:40:57 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Dec 3 01:40:57 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 3 01:40:57 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 3 01:40:57 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x140 took 28760 usecs Dec 3 01:40:57 localhost kernel: PCI: CLS 0 bytes, default 64 Dec 3 01:40:57 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 3 01:40:57 localhost kernel: Trying to unpack rootfs image as initramfs... Dec 3 01:40:57 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Dec 3 01:40:57 localhost kernel: ACPI: bus type thunderbolt registered Dec 3 01:40:57 localhost kernel: Initialise system trusted keyrings Dec 3 01:40:57 localhost kernel: Key type blacklist registered Dec 3 01:40:57 localhost kernel: workingset: timestamp_bits=36 max_order=22 bucket_order=0 Dec 3 01:40:57 localhost kernel: zbud: loaded Dec 3 01:40:57 localhost kernel: integrity: Platform Keyring initialized Dec 3 01:40:57 localhost kernel: NET: Registered PF_ALG protocol family Dec 3 01:40:57 localhost kernel: xor: automatically using best checksumming function avx Dec 3 01:40:57 localhost kernel: Key type asymmetric registered Dec 3 01:40:57 localhost kernel: Asymmetric key parser 'x509' registered Dec 3 01:40:57 localhost kernel: Running certificate verification selftests Dec 3 01:40:57 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Dec 3 01:40:57 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Dec 3 01:40:57 localhost kernel: io scheduler mq-deadline registered Dec 3 01:40:57 localhost kernel: io scheduler kyber registered Dec 3 01:40:57 localhost kernel: io scheduler bfq registered Dec 3 01:40:57 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Dec 3 01:40:57 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Dec 3 01:40:57 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Dec 3 01:40:57 localhost kernel: ACPI: button: Power Button [PWRF] Dec 3 01:40:57 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Dec 3 01:40:57 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 3 01:40:57 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 3 01:40:57 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 3 01:40:57 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 3 01:40:57 localhost kernel: Non-volatile memory driver v1.3 Dec 3 01:40:57 localhost kernel: rdac: device handler registered Dec 3 01:40:57 localhost kernel: hp_sw: device handler registered Dec 3 01:40:57 localhost kernel: emc: device handler registered Dec 3 01:40:57 localhost kernel: alua: device handler registered Dec 3 01:40:57 localhost kernel: libphy: Fixed MDIO Bus: probed Dec 3 01:40:57 localhost kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Dec 3 01:40:57 localhost kernel: ehci-pci: EHCI PCI platform driver Dec 3 01:40:57 localhost kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver Dec 3 01:40:57 localhost kernel: ohci-pci: OHCI PCI platform driver Dec 3 01:40:57 localhost kernel: uhci_hcd: USB Universal Host Controller Interface driver Dec 3 01:40:57 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Dec 3 01:40:57 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Dec 3 01:40:57 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Dec 3 01:40:57 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Dec 3 01:40:57 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Dec 3 01:40:57 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Dec 3 01:40:57 localhost kernel: usb usb1: Product: UHCI Host Controller Dec 3 01:40:57 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-284.11.1.el9_2.x86_64 uhci_hcd Dec 3 01:40:57 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Dec 3 01:40:57 localhost kernel: hub 1-0:1.0: USB hub found Dec 3 01:40:57 localhost kernel: hub 1-0:1.0: 2 ports detected Dec 3 01:40:57 localhost kernel: usbcore: registered new interface driver usbserial_generic Dec 3 01:40:57 localhost kernel: usbserial: USB Serial support registered for generic Dec 3 01:40:57 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 3 01:40:57 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 3 01:40:57 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 3 01:40:57 localhost kernel: mousedev: PS/2 mouse device common for all mice Dec 3 01:40:57 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 3 01:40:57 localhost kernel: rtc_cmos 00:04: registered as rtc0 Dec 3 01:40:57 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Dec 3 01:40:57 localhost kernel: rtc_cmos 00:04: setting system clock to 2025-12-03T06:40:56 UTC (1764744056) Dec 3 01:40:57 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Dec 3 01:40:57 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Dec 3 01:40:57 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Dec 3 01:40:57 localhost kernel: usbcore: registered new interface driver usbhid Dec 3 01:40:57 localhost kernel: usbhid: USB HID core driver Dec 3 01:40:57 localhost kernel: drop_monitor: Initializing network drop monitor service Dec 3 01:40:57 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Dec 3 01:40:57 localhost kernel: Initializing XFRM netlink socket Dec 3 01:40:57 localhost kernel: NET: Registered PF_INET6 protocol family Dec 3 01:40:57 localhost kernel: Segment Routing with IPv6 Dec 3 01:40:57 localhost kernel: NET: Registered PF_PACKET protocol family Dec 3 01:40:57 localhost kernel: mpls_gso: MPLS GSO support Dec 3 01:40:57 localhost kernel: IPI shorthand broadcast: enabled Dec 3 01:40:57 localhost kernel: AVX2 version of gcm_enc/dec engaged. Dec 3 01:40:57 localhost kernel: AES CTR mode by8 optimization enabled Dec 3 01:40:57 localhost kernel: sched_clock: Marking stable (738977278, 183095575)->(1057819027, -135746174) Dec 3 01:40:57 localhost kernel: registered taskstats version 1 Dec 3 01:40:57 localhost kernel: Loading compiled-in X.509 certificates Dec 3 01:40:57 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Dec 3 01:40:57 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Dec 3 01:40:57 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Dec 3 01:40:57 localhost kernel: zswap: loaded using pool lzo/zbud Dec 3 01:40:57 localhost kernel: page_owner is disabled Dec 3 01:40:57 localhost kernel: Key type big_key registered Dec 3 01:40:57 localhost kernel: Freeing initrd memory: 74232K Dec 3 01:40:57 localhost kernel: Key type encrypted registered Dec 3 01:40:57 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Dec 3 01:40:57 localhost kernel: Loading compiled-in module X.509 certificates Dec 3 01:40:57 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Dec 3 01:40:57 localhost kernel: ima: Allocated hash algorithm: sha256 Dec 3 01:40:57 localhost kernel: ima: No architecture policies found Dec 3 01:40:57 localhost kernel: evm: Initialising EVM extended attributes: Dec 3 01:40:57 localhost kernel: evm: security.selinux Dec 3 01:40:57 localhost kernel: evm: security.SMACK64 (disabled) Dec 3 01:40:57 localhost kernel: evm: security.SMACK64EXEC (disabled) Dec 3 01:40:57 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Dec 3 01:40:57 localhost kernel: evm: security.SMACK64MMAP (disabled) Dec 3 01:40:57 localhost kernel: evm: security.apparmor (disabled) Dec 3 01:40:57 localhost kernel: evm: security.ima Dec 3 01:40:57 localhost kernel: evm: security.capability Dec 3 01:40:57 localhost kernel: evm: HMAC attrs: 0x1 Dec 3 01:40:57 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Dec 3 01:40:57 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Dec 3 01:40:57 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Dec 3 01:40:57 localhost kernel: usb 1-1: Product: QEMU USB Tablet Dec 3 01:40:57 localhost kernel: usb 1-1: Manufacturer: QEMU Dec 3 01:40:57 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Dec 3 01:40:57 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Dec 3 01:40:57 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Dec 3 01:40:57 localhost kernel: Freeing unused decrypted memory: 2036K Dec 3 01:40:57 localhost kernel: Freeing unused kernel image (initmem) memory: 2792K Dec 3 01:40:57 localhost kernel: Write protecting the kernel read-only data: 26624k Dec 3 01:40:57 localhost kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 3 01:40:57 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 60K Dec 3 01:40:57 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Dec 3 01:40:57 localhost kernel: Run /init as init process Dec 3 01:40:57 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 3 01:40:57 localhost systemd[1]: Detected virtualization kvm. Dec 3 01:40:57 localhost systemd[1]: Detected architecture x86-64. Dec 3 01:40:57 localhost systemd[1]: Running in initrd. Dec 3 01:40:57 localhost systemd[1]: No hostname configured, using default hostname. Dec 3 01:40:57 localhost systemd[1]: Hostname set to . Dec 3 01:40:57 localhost systemd[1]: Initializing machine ID from VM UUID. Dec 3 01:40:57 localhost systemd[1]: Queued start job for default target Initrd Default Target. Dec 3 01:40:57 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Dec 3 01:40:57 localhost systemd[1]: Reached target Local Encrypted Volumes. Dec 3 01:40:57 localhost systemd[1]: Reached target Initrd /usr File System. Dec 3 01:40:57 localhost systemd[1]: Reached target Local File Systems. Dec 3 01:40:57 localhost systemd[1]: Reached target Path Units. Dec 3 01:40:57 localhost systemd[1]: Reached target Slice Units. Dec 3 01:40:57 localhost systemd[1]: Reached target Swaps. Dec 3 01:40:57 localhost systemd[1]: Reached target Timer Units. Dec 3 01:40:57 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Dec 3 01:40:57 localhost systemd[1]: Listening on Journal Socket (/dev/log). Dec 3 01:40:57 localhost systemd[1]: Listening on Journal Socket. Dec 3 01:40:57 localhost systemd[1]: Listening on udev Control Socket. Dec 3 01:40:57 localhost systemd[1]: Listening on udev Kernel Socket. Dec 3 01:40:57 localhost systemd[1]: Reached target Socket Units. Dec 3 01:40:57 localhost systemd[1]: Starting Create List of Static Device Nodes... Dec 3 01:40:57 localhost systemd[1]: Starting Journal Service... Dec 3 01:40:57 localhost systemd[1]: Starting Load Kernel Modules... Dec 3 01:40:57 localhost systemd[1]: Starting Create System Users... Dec 3 01:40:57 localhost systemd[1]: Starting Setup Virtual Console... Dec 3 01:40:57 localhost systemd[1]: Finished Create List of Static Device Nodes. Dec 3 01:40:57 localhost systemd-journald[282]: Journal started Dec 3 01:40:57 localhost systemd-journald[282]: Runtime Journal (/run/log/journal/0f5a840d39814de28c0370b28c91c26e) is 8.0M, max 314.7M, 306.7M free. Dec 3 01:40:57 localhost systemd-modules-load[283]: Module 'msr' is built in Dec 3 01:40:57 localhost systemd[1]: Started Journal Service. Dec 3 01:40:57 localhost systemd[1]: Finished Load Kernel Modules. Dec 3 01:40:57 localhost systemd[1]: Finished Setup Virtual Console. Dec 3 01:40:57 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Dec 3 01:40:57 localhost systemd[1]: Starting dracut cmdline hook... Dec 3 01:40:57 localhost systemd[1]: Starting Apply Kernel Variables... Dec 3 01:40:57 localhost systemd-sysusers[284]: Creating group 'sgx' with GID 997. Dec 3 01:40:57 localhost systemd-sysusers[284]: Creating group 'users' with GID 100. Dec 3 01:40:57 localhost systemd-sysusers[284]: Creating group 'dbus' with GID 81. Dec 3 01:40:57 localhost systemd[1]: Finished Apply Kernel Variables. Dec 3 01:40:57 localhost systemd-sysusers[284]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Dec 3 01:40:57 localhost systemd[1]: Finished Create System Users. Dec 3 01:40:57 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Dec 3 01:40:57 localhost dracut-cmdline[287]: dracut-9.2 (Plow) dracut-057-21.git20230214.el9 Dec 3 01:40:57 localhost systemd[1]: Starting Create Volatile Files and Directories... Dec 3 01:40:57 localhost dracut-cmdline[287]: Using kernel command line parameters: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Dec 3 01:40:57 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Dec 3 01:40:57 localhost systemd[1]: Finished Create Volatile Files and Directories. Dec 3 01:40:57 localhost systemd[1]: Finished dracut cmdline hook. Dec 3 01:40:57 localhost systemd[1]: Starting dracut pre-udev hook... Dec 3 01:40:57 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 3 01:40:57 localhost kernel: device-mapper: uevent: version 1.0.3 Dec 3 01:40:57 localhost kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Dec 3 01:40:57 localhost kernel: RPC: Registered named UNIX socket transport module. Dec 3 01:40:57 localhost kernel: RPC: Registered udp transport module. Dec 3 01:40:57 localhost kernel: RPC: Registered tcp transport module. Dec 3 01:40:57 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 3 01:40:57 localhost rpc.statd[407]: Version 2.5.4 starting Dec 3 01:40:57 localhost rpc.statd[407]: Initializing NSM state Dec 3 01:40:57 localhost rpc.idmapd[412]: Setting log level to 0 Dec 3 01:40:57 localhost systemd[1]: Finished dracut pre-udev hook. Dec 3 01:40:57 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Dec 3 01:40:57 localhost systemd-udevd[425]: Using default interface naming scheme 'rhel-9.0'. Dec 3 01:40:57 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Dec 3 01:40:57 localhost systemd[1]: Starting dracut pre-trigger hook... Dec 3 01:40:57 localhost systemd[1]: Finished dracut pre-trigger hook. Dec 3 01:40:57 localhost systemd[1]: Starting Coldplug All udev Devices... Dec 3 01:40:57 localhost systemd[1]: Finished Coldplug All udev Devices. Dec 3 01:40:57 localhost systemd[1]: Reached target System Initialization. Dec 3 01:40:57 localhost systemd[1]: Reached target Basic System. Dec 3 01:40:57 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Dec 3 01:40:57 localhost systemd[1]: Reached target Network. Dec 3 01:40:57 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Dec 3 01:40:57 localhost systemd[1]: Starting dracut initqueue hook... Dec 3 01:40:57 localhost kernel: virtio_blk virtio2: [vda] 838860800 512-byte logical blocks (429 GB/400 GiB) Dec 3 01:40:57 localhost kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 3 01:40:57 localhost kernel: GPT:20971519 != 838860799 Dec 3 01:40:57 localhost kernel: GPT:Alternate GPT header not at the end of the disk. Dec 3 01:40:57 localhost kernel: GPT:20971519 != 838860799 Dec 3 01:40:57 localhost kernel: GPT: Use GNU Parted to correct GPT errors. Dec 3 01:40:57 localhost kernel: vda: vda1 vda2 vda3 vda4 Dec 3 01:40:57 localhost kernel: scsi host0: ata_piix Dec 3 01:40:57 localhost kernel: scsi host1: ata_piix Dec 3 01:40:57 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 Dec 3 01:40:57 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 Dec 3 01:40:57 localhost systemd-udevd[446]: Network interface NamePolicy= disabled on kernel command line. Dec 3 01:40:57 localhost systemd[1]: Found device /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Dec 3 01:40:57 localhost systemd[1]: Reached target Initrd Root Device. Dec 3 01:40:58 localhost kernel: ata1: found unknown device (class 0) Dec 3 01:40:58 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 3 01:40:58 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 3 01:40:58 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Dec 3 01:40:58 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 3 01:40:58 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 3 01:40:58 localhost systemd[1]: Finished dracut initqueue hook. Dec 3 01:40:58 localhost systemd[1]: Reached target Preparation for Remote File Systems. Dec 3 01:40:58 localhost systemd[1]: Reached target Remote Encrypted Volumes. Dec 3 01:40:58 localhost systemd[1]: Reached target Remote File Systems. Dec 3 01:40:58 localhost systemd[1]: Starting dracut pre-mount hook... Dec 3 01:40:58 localhost systemd[1]: Finished dracut pre-mount hook. Dec 3 01:40:58 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a... Dec 3 01:40:58 localhost systemd-fsck[510]: /usr/sbin/fsck.xfs: XFS file system. Dec 3 01:40:58 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Dec 3 01:40:58 localhost systemd[1]: Mounting /sysroot... Dec 3 01:40:58 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Dec 3 01:40:58 localhost kernel: XFS (vda4): Mounting V5 Filesystem Dec 3 01:40:58 localhost kernel: XFS (vda4): Ending clean mount Dec 3 01:40:58 localhost systemd[1]: Mounted /sysroot. Dec 3 01:40:58 localhost systemd[1]: Reached target Initrd Root File System. Dec 3 01:40:58 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Dec 3 01:40:58 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Dec 3 01:40:58 localhost systemd[1]: Reached target Initrd File Systems. Dec 3 01:40:58 localhost systemd[1]: Reached target Initrd Default Target. Dec 3 01:40:58 localhost systemd[1]: Starting dracut mount hook... Dec 3 01:40:58 localhost systemd[1]: Finished dracut mount hook. Dec 3 01:40:58 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Dec 3 01:40:58 localhost rpc.idmapd[412]: exiting on signal 15 Dec 3 01:40:58 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Dec 3 01:40:58 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Dec 3 01:40:58 localhost systemd[1]: Stopped target Network. Dec 3 01:40:58 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Dec 3 01:40:58 localhost systemd[1]: Stopped target Timer Units. Dec 3 01:40:58 localhost systemd[1]: dbus.socket: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Dec 3 01:40:58 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Dec 3 01:40:58 localhost systemd[1]: Stopped target Initrd Default Target. Dec 3 01:40:58 localhost systemd[1]: Stopped target Basic System. Dec 3 01:40:58 localhost systemd[1]: Stopped target Initrd Root Device. Dec 3 01:40:58 localhost systemd[1]: Stopped target Initrd /usr File System. Dec 3 01:40:58 localhost systemd[1]: Stopped target Path Units. Dec 3 01:40:58 localhost systemd[1]: Stopped target Remote File Systems. Dec 3 01:40:58 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Dec 3 01:40:58 localhost systemd[1]: Stopped target Slice Units. Dec 3 01:40:58 localhost systemd[1]: Stopped target Socket Units. Dec 3 01:40:58 localhost systemd[1]: Stopped target System Initialization. Dec 3 01:40:58 localhost systemd[1]: Stopped target Local File Systems. Dec 3 01:40:58 localhost systemd[1]: Stopped target Swaps. Dec 3 01:40:58 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped dracut mount hook. Dec 3 01:40:58 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped dracut pre-mount hook. Dec 3 01:40:58 localhost systemd[1]: Stopped target Local Encrypted Volumes. Dec 3 01:40:58 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Dec 3 01:40:58 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped dracut initqueue hook. Dec 3 01:40:58 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped Apply Kernel Variables. Dec 3 01:40:58 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped Load Kernel Modules. Dec 3 01:40:58 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped Create Volatile Files and Directories. Dec 3 01:40:58 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped Coldplug All udev Devices. Dec 3 01:40:58 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped dracut pre-trigger hook. Dec 3 01:40:58 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Dec 3 01:40:58 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped Setup Virtual Console. Dec 3 01:40:58 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Dec 3 01:40:58 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Dec 3 01:40:58 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Closed udev Control Socket. Dec 3 01:40:58 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Closed udev Kernel Socket. Dec 3 01:40:58 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped dracut pre-udev hook. Dec 3 01:40:58 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped dracut cmdline hook. Dec 3 01:40:58 localhost systemd[1]: Starting Cleanup udev Database... Dec 3 01:40:58 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Dec 3 01:40:58 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped Create List of Static Device Nodes. Dec 3 01:40:58 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Stopped Create System Users. Dec 3 01:40:58 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 3 01:40:58 localhost systemd[1]: Finished Cleanup udev Database. Dec 3 01:40:58 localhost systemd[1]: Reached target Switch Root. Dec 3 01:40:58 localhost systemd[1]: Starting Switch Root... Dec 3 01:40:58 localhost systemd[1]: Switching root. Dec 3 01:40:58 localhost systemd-journald[282]: Journal stopped Dec 3 01:40:59 localhost systemd-journald[282]: Received SIGTERM from PID 1 (systemd). Dec 3 01:40:59 localhost kernel: audit: type=1404 audit(1764744058.823:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Dec 3 01:40:59 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 01:40:59 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 01:40:59 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 01:40:59 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 01:40:59 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 01:40:59 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 01:40:59 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 01:40:59 localhost kernel: audit: type=1403 audit(1764744058.910:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 3 01:40:59 localhost systemd[1]: Successfully loaded SELinux policy in 88.175ms. Dec 3 01:40:59 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.038ms. Dec 3 01:40:59 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 3 01:40:59 localhost systemd[1]: Detected virtualization kvm. Dec 3 01:40:59 localhost systemd[1]: Detected architecture x86-64. Dec 3 01:40:59 localhost systemd-rc-local-generator[581]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 01:40:59 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 01:40:59 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 3 01:40:59 localhost systemd[1]: Stopped Switch Root. Dec 3 01:40:59 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 3 01:40:59 localhost systemd[1]: Created slice Slice /system/getty. Dec 3 01:40:59 localhost systemd[1]: Created slice Slice /system/modprobe. Dec 3 01:40:59 localhost systemd[1]: Created slice Slice /system/serial-getty. Dec 3 01:40:59 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Dec 3 01:40:59 localhost systemd[1]: Created slice Slice /system/systemd-fsck. Dec 3 01:40:59 localhost systemd[1]: Created slice User and Session Slice. Dec 3 01:40:59 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Dec 3 01:40:59 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Dec 3 01:40:59 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Dec 3 01:40:59 localhost systemd[1]: Reached target Local Encrypted Volumes. Dec 3 01:40:59 localhost systemd[1]: Stopped target Switch Root. Dec 3 01:40:59 localhost systemd[1]: Stopped target Initrd File Systems. Dec 3 01:40:59 localhost systemd[1]: Stopped target Initrd Root File System. Dec 3 01:40:59 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Dec 3 01:40:59 localhost systemd[1]: Reached target Path Units. Dec 3 01:40:59 localhost systemd[1]: Reached target rpc_pipefs.target. Dec 3 01:40:59 localhost systemd[1]: Reached target Slice Units. Dec 3 01:40:59 localhost systemd[1]: Reached target Swaps. Dec 3 01:40:59 localhost systemd[1]: Reached target Local Verity Protected Volumes. Dec 3 01:40:59 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Dec 3 01:40:59 localhost systemd[1]: Reached target RPC Port Mapper. Dec 3 01:40:59 localhost systemd[1]: Listening on Process Core Dump Socket. Dec 3 01:40:59 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Dec 3 01:40:59 localhost systemd[1]: Listening on udev Control Socket. Dec 3 01:40:59 localhost systemd[1]: Listening on udev Kernel Socket. Dec 3 01:40:59 localhost systemd[1]: Mounting Huge Pages File System... Dec 3 01:40:59 localhost systemd[1]: Mounting POSIX Message Queue File System... Dec 3 01:40:59 localhost systemd[1]: Mounting Kernel Debug File System... Dec 3 01:40:59 localhost systemd[1]: Mounting Kernel Trace File System... Dec 3 01:40:59 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Dec 3 01:40:59 localhost systemd[1]: Starting Create List of Static Device Nodes... Dec 3 01:40:59 localhost systemd[1]: Starting Load Kernel Module configfs... Dec 3 01:40:59 localhost systemd[1]: Starting Load Kernel Module drm... Dec 3 01:40:59 localhost systemd[1]: Starting Load Kernel Module fuse... Dec 3 01:40:59 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Dec 3 01:40:59 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 3 01:40:59 localhost systemd[1]: Stopped File System Check on Root Device. Dec 3 01:40:59 localhost systemd[1]: Stopped Journal Service. Dec 3 01:40:59 localhost systemd[1]: Starting Journal Service... Dec 3 01:40:59 localhost systemd[1]: Starting Load Kernel Modules... Dec 3 01:40:59 localhost systemd[1]: Starting Generate network units from Kernel command line... Dec 3 01:40:59 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Dec 3 01:40:59 localhost kernel: fuse: init (API version 7.36) Dec 3 01:40:59 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Dec 3 01:40:59 localhost systemd[1]: Starting Coldplug All udev Devices... Dec 3 01:40:59 localhost systemd[1]: Mounted Huge Pages File System. Dec 3 01:40:59 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Dec 3 01:40:59 localhost systemd-journald[617]: Journal started Dec 3 01:40:59 localhost systemd-journald[617]: Runtime Journal (/run/log/journal/091dc475157499b18701a707a9102fd4) is 8.0M, max 314.7M, 306.7M free. Dec 3 01:40:59 localhost systemd[1]: Queued start job for default target Multi-User System. Dec 3 01:40:59 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Dec 3 01:40:59 localhost systemd-modules-load[618]: Module 'msr' is built in Dec 3 01:40:59 localhost systemd[1]: Started Journal Service. Dec 3 01:40:59 localhost systemd[1]: Mounted POSIX Message Queue File System. Dec 3 01:40:59 localhost systemd[1]: Mounted Kernel Debug File System. Dec 3 01:40:59 localhost systemd[1]: Mounted Kernel Trace File System. Dec 3 01:40:59 localhost systemd[1]: Finished Create List of Static Device Nodes. Dec 3 01:40:59 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 3 01:40:59 localhost systemd[1]: Finished Load Kernel Module configfs. Dec 3 01:40:59 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 3 01:40:59 localhost systemd[1]: Finished Load Kernel Module fuse. Dec 3 01:40:59 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Dec 3 01:40:59 localhost kernel: ACPI: bus type drm_connector registered Dec 3 01:40:59 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 3 01:40:59 localhost systemd[1]: Finished Load Kernel Module drm. Dec 3 01:40:59 localhost systemd[1]: Finished Load Kernel Modules. Dec 3 01:40:59 localhost systemd[1]: Finished Generate network units from Kernel command line. Dec 3 01:40:59 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Dec 3 01:40:59 localhost systemd[1]: Mounting FUSE Control File System... Dec 3 01:40:59 localhost systemd[1]: Mounting Kernel Configuration File System... Dec 3 01:40:59 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Dec 3 01:40:59 localhost systemd[1]: Starting Rebuild Hardware Database... Dec 3 01:40:59 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Dec 3 01:40:59 localhost systemd[1]: Starting Load/Save Random Seed... Dec 3 01:40:59 localhost systemd-journald[617]: Runtime Journal (/run/log/journal/091dc475157499b18701a707a9102fd4) is 8.0M, max 314.7M, 306.7M free. Dec 3 01:40:59 localhost systemd-journald[617]: Received client request to flush runtime journal. Dec 3 01:40:59 localhost systemd[1]: Starting Apply Kernel Variables... Dec 3 01:40:59 localhost systemd[1]: Starting Create System Users... Dec 3 01:40:59 localhost systemd[1]: Mounted FUSE Control File System. Dec 3 01:40:59 localhost systemd[1]: Mounted Kernel Configuration File System. Dec 3 01:40:59 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Dec 3 01:40:59 localhost systemd[1]: Finished Load/Save Random Seed. Dec 3 01:40:59 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Dec 3 01:40:59 localhost systemd[1]: Finished Apply Kernel Variables. Dec 3 01:40:59 localhost systemd-sysusers[630]: Creating group 'sgx' with GID 989. Dec 3 01:40:59 localhost systemd-sysusers[630]: Creating group 'systemd-oom' with GID 988. Dec 3 01:40:59 localhost systemd-sysusers[630]: Creating user 'systemd-oom' (systemd Userspace OOM Killer) with UID 988 and GID 988. Dec 3 01:40:59 localhost systemd[1]: Finished Coldplug All udev Devices. Dec 3 01:40:59 localhost systemd[1]: Finished Create System Users. Dec 3 01:40:59 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Dec 3 01:40:59 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Dec 3 01:40:59 localhost systemd[1]: Reached target Preparation for Local File Systems. Dec 3 01:40:59 localhost systemd[1]: Set up automount EFI System Partition Automount. Dec 3 01:40:59 localhost systemd[1]: Finished Rebuild Hardware Database. Dec 3 01:40:59 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Dec 3 01:40:59 localhost systemd-udevd[635]: Using default interface naming scheme 'rhel-9.0'. Dec 3 01:40:59 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Dec 3 01:40:59 localhost systemd[1]: Starting Load Kernel Module configfs... Dec 3 01:40:59 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 3 01:40:59 localhost systemd[1]: Finished Load Kernel Module configfs. Dec 3 01:40:59 localhost systemd-udevd[637]: Network interface NamePolicy= disabled on kernel command line. Dec 3 01:41:00 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Dec 3 01:41:00 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/b141154b-6a70-437a-a97f-d160c9ba37eb being skipped. Dec 3 01:41:00 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/7B77-95E7 being skipped. Dec 3 01:41:00 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/7B77-95E7... Dec 3 01:41:00 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Dec 3 01:41:00 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Dec 3 01:41:00 localhost systemd-fsck[682]: fsck.fat 4.2 (2021-01-31) Dec 3 01:41:00 localhost systemd-fsck[682]: /dev/vda2: 12 files, 1782/51145 clusters Dec 3 01:41:00 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/7B77-95E7. Dec 3 01:41:00 localhost kernel: SVM: TSC scaling supported Dec 3 01:41:00 localhost kernel: kvm: Nested Virtualization enabled Dec 3 01:41:00 localhost kernel: SVM: kvm: Nested Paging enabled Dec 3 01:41:00 localhost kernel: SVM: LBR virtualization supported Dec 3 01:41:00 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Dec 3 01:41:00 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Dec 3 01:41:00 localhost kernel: Console: switching to colour dummy device 80x25 Dec 3 01:41:00 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Dec 3 01:41:00 localhost kernel: [drm] features: -context_init Dec 3 01:41:00 localhost kernel: [drm] number of scanouts: 1 Dec 3 01:41:00 localhost kernel: [drm] number of cap sets: 0 Dec 3 01:41:00 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 0 for virtio0 on minor 0 Dec 3 01:41:00 localhost kernel: virtio_gpu virtio0: [drm] drm_plane_enable_fb_damage_clips() not called Dec 3 01:41:00 localhost kernel: Console: switching to colour frame buffer device 128x48 Dec 3 01:41:00 localhost kernel: virtio_gpu virtio0: [drm] fb0: virtio_gpudrmfb frame buffer device Dec 3 01:41:00 localhost systemd[1]: Mounting /boot... Dec 3 01:41:00 localhost kernel: XFS (vda3): Mounting V5 Filesystem Dec 3 01:41:00 localhost kernel: XFS (vda3): Ending clean mount Dec 3 01:41:00 localhost kernel: xfs filesystem being mounted at /boot supports timestamps until 2038 (0x7fffffff) Dec 3 01:41:00 localhost systemd[1]: Mounted /boot. Dec 3 01:41:00 localhost systemd[1]: Mounting /boot/efi... Dec 3 01:41:00 localhost systemd[1]: Mounted /boot/efi. Dec 3 01:41:00 localhost systemd[1]: Reached target Local File Systems. Dec 3 01:41:00 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Dec 3 01:41:00 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Dec 3 01:41:00 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Dec 3 01:41:00 localhost systemd[1]: Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 3 01:41:00 localhost systemd[1]: Starting Automatic Boot Loader Update... Dec 3 01:41:00 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Dec 3 01:41:00 localhost systemd[1]: Starting Create Volatile Files and Directories... Dec 3 01:41:00 localhost systemd[1]: efi.automount: Got automount request for /efi, triggered by 715 (bootctl) Dec 3 01:41:00 localhost systemd[1]: Starting File System Check on /dev/vda2... Dec 3 01:41:00 localhost systemd[1]: Finished File System Check on /dev/vda2. Dec 3 01:41:00 localhost systemd[1]: Mounting EFI System Partition Automount... Dec 3 01:41:00 localhost systemd[1]: Mounted EFI System Partition Automount. Dec 3 01:41:00 localhost systemd[1]: Finished Automatic Boot Loader Update. Dec 3 01:41:00 localhost systemd[1]: Finished Create Volatile Files and Directories. Dec 3 01:41:00 localhost systemd[1]: Starting Security Auditing Service... Dec 3 01:41:00 localhost systemd[1]: Starting RPC Bind... Dec 3 01:41:00 localhost systemd[1]: Starting Rebuild Journal Catalog... Dec 3 01:41:00 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Dec 3 01:41:00 localhost auditd[726]: audit dispatcher initialized with q_depth=1200 and 1 active plugins Dec 3 01:41:00 localhost auditd[726]: Init complete, auditd 3.0.7 listening for events (startup state enable) Dec 3 01:41:00 localhost systemd[1]: Finished Rebuild Journal Catalog. Dec 3 01:41:00 localhost systemd[1]: Starting Update is Completed... Dec 3 01:41:00 localhost systemd[1]: Finished Update is Completed. Dec 3 01:41:00 localhost systemd[1]: Started RPC Bind. Dec 3 01:41:00 localhost augenrules[731]: /sbin/augenrules: No change Dec 3 01:41:00 localhost augenrules[742]: No rules Dec 3 01:41:00 localhost augenrules[742]: enabled 1 Dec 3 01:41:00 localhost augenrules[742]: failure 1 Dec 3 01:41:00 localhost augenrules[742]: pid 726 Dec 3 01:41:00 localhost augenrules[742]: rate_limit 0 Dec 3 01:41:00 localhost augenrules[742]: backlog_limit 8192 Dec 3 01:41:00 localhost augenrules[742]: lost 0 Dec 3 01:41:00 localhost augenrules[742]: backlog 3 Dec 3 01:41:00 localhost augenrules[742]: backlog_wait_time 60000 Dec 3 01:41:00 localhost augenrules[742]: backlog_wait_time_actual 0 Dec 3 01:41:00 localhost augenrules[742]: enabled 1 Dec 3 01:41:00 localhost augenrules[742]: failure 1 Dec 3 01:41:00 localhost augenrules[742]: pid 726 Dec 3 01:41:00 localhost augenrules[742]: rate_limit 0 Dec 3 01:41:00 localhost augenrules[742]: backlog_limit 8192 Dec 3 01:41:00 localhost augenrules[742]: lost 0 Dec 3 01:41:00 localhost augenrules[742]: backlog 2 Dec 3 01:41:00 localhost augenrules[742]: backlog_wait_time 60000 Dec 3 01:41:00 localhost augenrules[742]: backlog_wait_time_actual 0 Dec 3 01:41:00 localhost augenrules[742]: enabled 1 Dec 3 01:41:00 localhost augenrules[742]: failure 1 Dec 3 01:41:00 localhost augenrules[742]: pid 726 Dec 3 01:41:00 localhost augenrules[742]: rate_limit 0 Dec 3 01:41:00 localhost augenrules[742]: backlog_limit 8192 Dec 3 01:41:00 localhost augenrules[742]: lost 0 Dec 3 01:41:00 localhost augenrules[742]: backlog 0 Dec 3 01:41:00 localhost augenrules[742]: backlog_wait_time 60000 Dec 3 01:41:00 localhost augenrules[742]: backlog_wait_time_actual 0 Dec 3 01:41:00 localhost systemd[1]: Started Security Auditing Service. Dec 3 01:41:00 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Dec 3 01:41:00 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Dec 3 01:41:00 localhost systemd[1]: Reached target System Initialization. Dec 3 01:41:00 localhost systemd[1]: Started dnf makecache --timer. Dec 3 01:41:00 localhost systemd[1]: Started Daily rotation of log files. Dec 3 01:41:00 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Dec 3 01:41:00 localhost systemd[1]: Reached target Timer Units. Dec 3 01:41:00 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Dec 3 01:41:00 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Dec 3 01:41:00 localhost systemd[1]: Reached target Socket Units. Dec 3 01:41:00 localhost systemd[1]: Starting Initial cloud-init job (pre-networking)... Dec 3 01:41:00 localhost systemd[1]: Starting D-Bus System Message Bus... Dec 3 01:41:00 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 3 01:41:00 localhost systemd[1]: Started D-Bus System Message Bus. Dec 3 01:41:00 localhost systemd[1]: Reached target Basic System. Dec 3 01:41:00 localhost systemd[1]: Starting NTP client/server... Dec 3 01:41:00 localhost journal[751]: Ready Dec 3 01:41:00 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Dec 3 01:41:00 localhost systemd[1]: Started irqbalance daemon. Dec 3 01:41:00 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Dec 3 01:41:00 localhost systemd[1]: Starting System Logging Service... Dec 3 01:41:00 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 01:41:00 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 01:41:00 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 01:41:00 localhost systemd[1]: Reached target sshd-keygen.target. Dec 3 01:41:00 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Dec 3 01:41:00 localhost systemd[1]: Reached target User and Group Name Lookups. Dec 3 01:41:00 localhost systemd[1]: Starting User Login Management... Dec 3 01:41:00 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Dec 3 01:41:00 localhost systemd[1]: Started System Logging Service. Dec 3 01:41:00 localhost rsyslogd[759]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="759" x-info="https://www.rsyslog.com"] start Dec 3 01:41:00 localhost rsyslogd[759]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2040 ] Dec 3 01:41:00 localhost chronyd[766]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Dec 3 01:41:00 localhost chronyd[766]: Using right/UTC timezone to obtain leap second data Dec 3 01:41:00 localhost chronyd[766]: Loaded seccomp filter (level 2) Dec 3 01:41:00 localhost systemd[1]: Started NTP client/server. Dec 3 01:41:00 localhost systemd-logind[760]: New seat seat0. Dec 3 01:41:00 localhost systemd-logind[760]: Watching system buttons on /dev/input/event0 (Power Button) Dec 3 01:41:00 localhost systemd-logind[760]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Dec 3 01:41:00 localhost systemd[1]: Started User Login Management. Dec 3 01:41:00 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 01:41:01 localhost cloud-init[770]: Cloud-init v. 22.1-9.el9 running 'init-local' at Wed, 03 Dec 2025 06:41:01 +0000. Up 5.27 seconds. Dec 3 01:41:01 localhost systemd[1]: Starting Hostname Service... Dec 3 01:41:01 localhost systemd[1]: Started Hostname Service. Dec 3 01:41:01 localhost systemd-hostnamed[784]: Hostname set to (static) Dec 3 01:41:01 localhost systemd[1]: Finished Initial cloud-init job (pre-networking). Dec 3 01:41:01 localhost systemd[1]: Reached target Preparation for Network. Dec 3 01:41:01 localhost systemd[1]: Starting Network Manager... Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.5885] NetworkManager (version 1.42.2-1.el9) is starting... (boot:e368b8ce-f6ac-4f40-b33d-b54584550d8b) Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.5890] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Dec 3 01:41:01 localhost systemd[1]: Started Network Manager. Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.5918] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Dec 3 01:41:01 localhost systemd[1]: Reached target Network. Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.5972] manager[0x5580512a1020]: monitoring kernel firmware directory '/lib/firmware'. Dec 3 01:41:01 localhost systemd[1]: Starting Network Manager Wait Online... Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.5998] hostname: hostname: using hostnamed Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.5998] hostname: static hostname changed from (none) to "np0005543226.novalocal" Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6005] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Dec 3 01:41:01 localhost systemd[1]: Starting GSSAPI Proxy Daemon... Dec 3 01:41:01 localhost systemd[1]: Starting Enable periodic update of entitlement certificates.... Dec 3 01:41:01 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Dec 3 01:41:01 localhost systemd[1]: Started Enable periodic update of entitlement certificates.. Dec 3 01:41:01 localhost systemd[1]: Started GSSAPI Proxy Daemon. Dec 3 01:41:01 localhost systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Dec 3 01:41:01 localhost systemd[1]: Reached target NFS client services. Dec 3 01:41:01 localhost systemd[1]: Reached target Preparation for Remote File Systems. Dec 3 01:41:01 localhost systemd[1]: Reached target Remote File Systems. Dec 3 01:41:01 localhost systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6365] manager[0x5580512a1020]: rfkill: Wi-Fi hardware radio set enabled Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6366] manager[0x5580512a1020]: rfkill: WWAN hardware radio set enabled Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6416] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Dec 3 01:41:01 localhost systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6418] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6424] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6427] manager: Networking is enabled by state file Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6445] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6446] settings: Loaded settings plugin: keyfile (internal) Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6490] dhcp: init: Using DHCP client 'internal' Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6494] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Dec 3 01:41:01 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6531] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6556] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6576] device (lo): Activation: starting connection 'lo' (f43b831f-e499-4112-8ffb-bc410ff3f2af) Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6598] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6610] device (eth0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6666] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6670] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6672] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6676] device (eth0): carrier: link connected Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6679] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6686] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Dec 3 01:41:01 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6760] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6767] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6769] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6773] manager: NetworkManager state is now CONNECTING Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6775] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6787] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6792] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6801] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6813] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.6822] device (lo): Activation: successful, device activated. Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.7124] dhcp4 (eth0): state changed new lease, address=38.102.83.136 Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.7129] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.7161] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.7182] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.7185] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.7190] manager: NetworkManager state is now CONNECTED_SITE Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.7194] device (eth0): Activation: successful, device activated. Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.7200] manager: NetworkManager state is now CONNECTED_GLOBAL Dec 3 01:41:01 localhost NetworkManager[789]: [1764744061.7206] manager: startup complete Dec 3 01:41:01 localhost systemd[1]: Finished Network Manager Wait Online. Dec 3 01:41:01 localhost systemd[1]: Starting Initial cloud-init job (metadata service crawler)... Dec 3 01:41:01 localhost systemd[1]: Starting Authorization Manager... Dec 3 01:41:01 localhost cloud-init[1031]: Cloud-init v. 22.1-9.el9 running 'init' at Wed, 03 Dec 2025 06:41:01 +0000. Up 6.13 seconds. Dec 3 01:41:01 localhost polkitd[1030]: Started polkitd version 0.117 Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: | eth0 | True | 38.102.83.136 | 255.255.255.0 | global | fa:16:3e:94:16:be | Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: | eth0 | True | fe80::f816:3eff:fe94:16be/64 | . | link | fa:16:3e:94:16:be | Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: | lo | True | ::1/128 | . | host | . | Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: +-------+-------------+---------+-----------+-------+ Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: | Route | Destination | Gateway | Interface | Flags | Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: +-------+-------------+---------+-----------+-------+ Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Dec 3 01:41:01 localhost cloud-init[1031]: ci-info: | 3 | multicast | :: | eth0 | U | Dec 3 01:41:02 localhost cloud-init[1031]: ci-info: +-------+-------------+---------+-----------+-------+ Dec 3 01:41:02 localhost systemd[1]: Started Dynamic System Tuning Daemon. Dec 3 01:41:02 localhost systemd[1]: Started Authorization Manager. Dec 3 01:41:04 localhost cloud-init[1031]: Generating public/private rsa key pair. Dec 3 01:41:04 localhost cloud-init[1031]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Dec 3 01:41:04 localhost cloud-init[1031]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Dec 3 01:41:04 localhost cloud-init[1031]: The key fingerprint is: Dec 3 01:41:04 localhost cloud-init[1031]: SHA256:9sQHL6+jp+74RkvJ8g3XpnO6hDaoRuAR5H5K8mEw828 root@np0005543226.novalocal Dec 3 01:41:04 localhost cloud-init[1031]: The key's randomart image is: Dec 3 01:41:04 localhost cloud-init[1031]: +---[RSA 3072]----+ Dec 3 01:41:04 localhost cloud-init[1031]: | .. | Dec 3 01:41:04 localhost cloud-init[1031]: | .. | Dec 3 01:41:04 localhost cloud-init[1031]: |+ .. . | Dec 3 01:41:04 localhost cloud-init[1031]: | *o . o | Dec 3 01:41:04 localhost cloud-init[1031]: |..*o. .S.+.o | Dec 3 01:41:04 localhost cloud-init[1031]: | =.=. .o*+.+o | Dec 3 01:41:04 localhost cloud-init[1031]: | o.E .=+=oo. | Dec 3 01:41:04 localhost cloud-init[1031]: | ... o+o*.. | Dec 3 01:41:04 localhost cloud-init[1031]: | .. .=*++* | Dec 3 01:41:04 localhost cloud-init[1031]: +----[SHA256]-----+ Dec 3 01:41:04 localhost cloud-init[1031]: Generating public/private ecdsa key pair. Dec 3 01:41:04 localhost cloud-init[1031]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Dec 3 01:41:04 localhost cloud-init[1031]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Dec 3 01:41:04 localhost cloud-init[1031]: The key fingerprint is: Dec 3 01:41:04 localhost cloud-init[1031]: SHA256:ywSOlYDuaYcMSHs6GJW7dq6+MwdzCDc48/3m+SfOT6U root@np0005543226.novalocal Dec 3 01:41:04 localhost cloud-init[1031]: The key's randomart image is: Dec 3 01:41:04 localhost cloud-init[1031]: +---[ECDSA 256]---+ Dec 3 01:41:04 localhost cloud-init[1031]: | o. | Dec 3 01:41:04 localhost cloud-init[1031]: | .+ . . | Dec 3 01:41:04 localhost cloud-init[1031]: |o+.. + | Dec 3 01:41:04 localhost cloud-init[1031]: |O.=. + . | Dec 3 01:41:04 localhost cloud-init[1031]: |.@oB. . S . | Dec 3 01:41:04 localhost cloud-init[1031]: |.o& = o . o | Dec 3 01:41:04 localhost cloud-init[1031]: | o.B . o E | Dec 3 01:41:04 localhost cloud-init[1031]: | o o oo... | Dec 3 01:41:04 localhost cloud-init[1031]: | .+* ooo++. | Dec 3 01:41:04 localhost cloud-init[1031]: +----[SHA256]-----+ Dec 3 01:41:04 localhost cloud-init[1031]: Generating public/private ed25519 key pair. Dec 3 01:41:04 localhost cloud-init[1031]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Dec 3 01:41:04 localhost cloud-init[1031]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Dec 3 01:41:04 localhost cloud-init[1031]: The key fingerprint is: Dec 3 01:41:04 localhost cloud-init[1031]: SHA256:r1OX4AMzjuXPwvJWlCtTfiDZyMK/Eu3lCA2kij0SjTA root@np0005543226.novalocal Dec 3 01:41:04 localhost cloud-init[1031]: The key's randomart image is: Dec 3 01:41:04 localhost cloud-init[1031]: +--[ED25519 256]--+ Dec 3 01:41:04 localhost cloud-init[1031]: | | Dec 3 01:41:04 localhost cloud-init[1031]: |E . | Dec 3 01:41:04 localhost cloud-init[1031]: |.+ + . + . | Dec 3 01:41:04 localhost cloud-init[1031]: |o . . + X B | Dec 3 01:41:04 localhost cloud-init[1031]: | + . @SX + . | Dec 3 01:41:04 localhost cloud-init[1031]: |o + + O.O + | Dec 3 01:41:04 localhost cloud-init[1031]: | . . = %.+ | Dec 3 01:41:04 localhost cloud-init[1031]: | o O.+ | Dec 3 01:41:04 localhost cloud-init[1031]: | =oo | Dec 3 01:41:04 localhost cloud-init[1031]: +----[SHA256]-----+ Dec 3 01:41:04 localhost sm-notify[1128]: Version 2.5.4 starting Dec 3 01:41:04 localhost systemd[1]: Finished Initial cloud-init job (metadata service crawler). Dec 3 01:41:04 localhost systemd[1]: Reached target Cloud-config availability. Dec 3 01:41:04 localhost systemd[1]: Reached target Network is Online. Dec 3 01:41:04 localhost systemd[1]: Starting Apply the settings specified in cloud-config... Dec 3 01:41:04 localhost sshd[1129]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:04 localhost systemd[1]: Run Insights Client at boot was skipped because of an unmet condition check (ConditionPathExists=/etc/insights-client/.run_insights_client_next_boot). Dec 3 01:41:04 localhost systemd[1]: Starting Crash recovery kernel arming... Dec 3 01:41:04 localhost systemd[1]: Starting Notify NFS peers of a restart... Dec 3 01:41:04 localhost systemd[1]: Starting OpenSSH server daemon... Dec 3 01:41:04 localhost systemd[1]: Starting Permit User Sessions... Dec 3 01:41:04 localhost systemd[1]: Started Notify NFS peers of a restart. Dec 3 01:41:04 localhost systemd[1]: Finished Permit User Sessions. Dec 3 01:41:04 localhost systemd[1]: Started Command Scheduler. Dec 3 01:41:04 localhost systemd[1]: Started Getty on tty1. Dec 3 01:41:04 localhost systemd[1]: Started Serial Getty on ttyS0. Dec 3 01:41:04 localhost systemd[1]: Reached target Login Prompts. Dec 3 01:41:04 localhost systemd[1]: Started OpenSSH server daemon. Dec 3 01:41:04 localhost systemd[1]: Reached target Multi-User System. Dec 3 01:41:04 localhost systemd[1]: Starting Record Runlevel Change in UTMP... Dec 3 01:41:04 localhost systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 3 01:41:04 localhost systemd[1]: Finished Record Runlevel Change in UTMP. Dec 3 01:41:04 localhost kdumpctl[1134]: kdump: No kdump initial ramdisk found. Dec 3 01:41:04 localhost kdumpctl[1134]: kdump: Rebuilding /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img Dec 3 01:41:04 localhost cloud-init[1232]: Cloud-init v. 22.1-9.el9 running 'modules:config' at Wed, 03 Dec 2025 06:41:04 +0000. Up 8.87 seconds. Dec 3 01:41:04 localhost systemd[1]: Finished Apply the settings specified in cloud-config. Dec 3 01:41:04 localhost systemd[1]: Starting Execute cloud user/final scripts... Dec 3 01:41:05 localhost dracut[1415]: dracut-057-21.git20230214.el9 Dec 3 01:41:05 localhost cloud-init[1416]: Cloud-init v. 22.1-9.el9 running 'modules:final' at Wed, 03 Dec 2025 06:41:05 +0000. Up 9.26 seconds. Dec 3 01:41:05 localhost cloud-init[1433]: ############################################################# Dec 3 01:41:05 localhost cloud-init[1436]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Dec 3 01:41:05 localhost cloud-init[1445]: 256 SHA256:ywSOlYDuaYcMSHs6GJW7dq6+MwdzCDc48/3m+SfOT6U root@np0005543226.novalocal (ECDSA) Dec 3 01:41:05 localhost dracut[1418]: Executing: /usr/bin/dracut --add kdumpbase --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics -o "plymouth resume ifcfg earlykdump" --mount "/dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device -f /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img 5.14.0-284.11.1.el9_2.x86_64 Dec 3 01:41:05 localhost cloud-init[1453]: 256 SHA256:r1OX4AMzjuXPwvJWlCtTfiDZyMK/Eu3lCA2kij0SjTA root@np0005543226.novalocal (ED25519) Dec 3 01:41:05 localhost cloud-init[1459]: 3072 SHA256:9sQHL6+jp+74RkvJ8g3XpnO6hDaoRuAR5H5K8mEw828 root@np0005543226.novalocal (RSA) Dec 3 01:41:05 localhost cloud-init[1461]: -----END SSH HOST KEY FINGERPRINTS----- Dec 3 01:41:05 localhost cloud-init[1463]: ############################################################# Dec 3 01:41:05 localhost cloud-init[1416]: Cloud-init v. 22.1-9.el9 finished at Wed, 03 Dec 2025 06:41:05 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 9.51 seconds Dec 3 01:41:05 localhost systemd[1]: Reloading Network Manager... Dec 3 01:41:05 localhost dracut[1418]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Dec 3 01:41:05 localhost NetworkManager[789]: [1764744065.4515] audit: op="reload" arg="0" pid=1555 uid=0 result="success" Dec 3 01:41:05 localhost NetworkManager[789]: [1764744065.4537] config: signal: SIGHUP (no changes from disk) Dec 3 01:41:05 localhost systemd[1]: Reloaded Network Manager. Dec 3 01:41:05 localhost systemd[1]: Finished Execute cloud user/final scripts. Dec 3 01:41:05 localhost dracut[1418]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Dec 3 01:41:05 localhost systemd[1]: Reached target Cloud-init target. Dec 3 01:41:05 localhost dracut[1418]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Dec 3 01:41:05 localhost dracut[1418]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Dec 3 01:41:05 localhost dracut[1418]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Dec 3 01:41:06 localhost dracut[1418]: memstrack is not available Dec 3 01:41:06 localhost dracut[1418]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Dec 3 01:41:06 localhost dracut[1418]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Dec 3 01:41:06 localhost dracut[1418]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Dec 3 01:41:06 localhost dracut[1418]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Dec 3 01:41:06 localhost dracut[1418]: memstrack is not available Dec 3 01:41:06 localhost dracut[1418]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Dec 3 01:41:06 localhost dracut[1418]: *** Including module: systemd *** Dec 3 01:41:06 localhost dracut[1418]: *** Including module: systemd-initrd *** Dec 3 01:41:06 localhost chronyd[766]: Selected source 206.108.0.132 (2.rhel.pool.ntp.org) Dec 3 01:41:06 localhost chronyd[766]: System clock TAI offset set to 37 seconds Dec 3 01:41:06 localhost dracut[1418]: *** Including module: i18n *** Dec 3 01:41:06 localhost dracut[1418]: No KEYMAP configured. Dec 3 01:41:06 localhost dracut[1418]: *** Including module: drm *** Dec 3 01:41:07 localhost dracut[1418]: *** Including module: prefixdevname *** Dec 3 01:41:07 localhost dracut[1418]: *** Including module: kernel-modules *** Dec 3 01:41:07 localhost dracut[1418]: *** Including module: kernel-modules-extra *** Dec 3 01:41:07 localhost dracut[1418]: *** Including module: qemu *** Dec 3 01:41:08 localhost dracut[1418]: *** Including module: fstab-sys *** Dec 3 01:41:08 localhost dracut[1418]: *** Including module: rootfs-block *** Dec 3 01:41:08 localhost dracut[1418]: *** Including module: terminfo *** Dec 3 01:41:08 localhost dracut[1418]: *** Including module: udev-rules *** Dec 3 01:41:08 localhost dracut[1418]: Skipping udev rule: 91-permissions.rules Dec 3 01:41:08 localhost dracut[1418]: Skipping udev rule: 80-drivers-modprobe.rules Dec 3 01:41:08 localhost dracut[1418]: *** Including module: virtiofs *** Dec 3 01:41:08 localhost dracut[1418]: *** Including module: dracut-systemd *** Dec 3 01:41:09 localhost dracut[1418]: *** Including module: usrmount *** Dec 3 01:41:09 localhost dracut[1418]: *** Including module: base *** Dec 3 01:41:09 localhost dracut[1418]: *** Including module: fs-lib *** Dec 3 01:41:09 localhost dracut[1418]: *** Including module: kdumpbase *** Dec 3 01:41:09 localhost dracut[1418]: *** Including module: microcode_ctl-fw_dir_override *** Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl module: mangling fw_dir Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: configuration "intel" is ignored Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: configuration "intel-06-2d-07" is ignored Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: configuration "intel-06-4e-03" is ignored Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: configuration "intel-06-4f-01" is ignored Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: configuration "intel-06-55-04" is ignored Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: configuration "intel-06-5e-03" is ignored Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: configuration "intel-06-8c-01" is ignored Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Dec 3 01:41:09 localhost dracut[1418]: microcode_ctl: final fw_dir: "/lib/firmware/updates/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware/updates /lib/firmware/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware" Dec 3 01:41:10 localhost dracut[1418]: *** Including module: shutdown *** Dec 3 01:41:10 localhost dracut[1418]: *** Including module: squash *** Dec 3 01:41:10 localhost dracut[1418]: *** Including modules done *** Dec 3 01:41:10 localhost dracut[1418]: *** Installing kernel module dependencies *** Dec 3 01:41:10 localhost dracut[1418]: *** Installing kernel module dependencies done *** Dec 3 01:41:10 localhost dracut[1418]: *** Resolving executable dependencies *** Dec 3 01:41:11 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 3 01:41:12 localhost dracut[1418]: *** Resolving executable dependencies done *** Dec 3 01:41:12 localhost dracut[1418]: *** Hardlinking files *** Dec 3 01:41:12 localhost dracut[1418]: Mode: real Dec 3 01:41:12 localhost dracut[1418]: Files: 1099 Dec 3 01:41:12 localhost dracut[1418]: Linked: 3 files Dec 3 01:41:12 localhost dracut[1418]: Compared: 0 xattrs Dec 3 01:41:12 localhost dracut[1418]: Compared: 373 files Dec 3 01:41:12 localhost dracut[1418]: Saved: 61.04 KiB Dec 3 01:41:12 localhost dracut[1418]: Duration: 0.027897 seconds Dec 3 01:41:12 localhost dracut[1418]: *** Hardlinking files done *** Dec 3 01:41:12 localhost dracut[1418]: Could not find 'strip'. Not stripping the initramfs. Dec 3 01:41:12 localhost dracut[1418]: *** Generating early-microcode cpio image *** Dec 3 01:41:12 localhost dracut[1418]: *** Constructing AuthenticAMD.bin *** Dec 3 01:41:12 localhost dracut[1418]: *** Store current command line parameters *** Dec 3 01:41:12 localhost dracut[1418]: Stored kernel commandline: Dec 3 01:41:12 localhost dracut[1418]: No dracut internal kernel commandline stored in the initramfs Dec 3 01:41:12 localhost dracut[1418]: *** Install squash loader *** Dec 3 01:41:13 localhost dracut[1418]: *** Squashing the files inside the initramfs *** Dec 3 01:41:14 localhost dracut[1418]: *** Squashing the files inside the initramfs done *** Dec 3 01:41:14 localhost dracut[1418]: *** Creating image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' *** Dec 3 01:41:14 localhost dracut[1418]: *** Creating initramfs image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' done *** Dec 3 01:41:14 localhost kdumpctl[1134]: kdump: kexec: loaded kdump kernel Dec 3 01:41:14 localhost kdumpctl[1134]: kdump: Starting kdump: [OK] Dec 3 01:41:14 localhost systemd[1]: Finished Crash recovery kernel arming. Dec 3 01:41:14 localhost systemd[1]: Startup finished in 1.221s (kernel) + 1.798s (initrd) + 16.008s (userspace) = 19.028s. Dec 3 01:41:15 localhost sshd[4151]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:15 localhost sshd[4153]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:15 localhost sshd[4155]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:16 localhost sshd[4157]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:16 localhost sshd[4159]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:16 localhost sshd[4161]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:16 localhost sshd[4163]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:16 localhost sshd[4165]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:16 localhost sshd[4167]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:31 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 3 01:41:58 localhost sshd[4172]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:58 localhost systemd[1]: Created slice User Slice of UID 1000. Dec 3 01:41:58 localhost systemd[1]: Starting User Runtime Directory /run/user/1000... Dec 3 01:41:58 localhost systemd-logind[760]: New session 1 of user zuul. Dec 3 01:41:58 localhost systemd[1]: Finished User Runtime Directory /run/user/1000. Dec 3 01:41:58 localhost systemd[1]: Starting User Manager for UID 1000... Dec 3 01:41:58 localhost systemd[4176]: Queued start job for default target Main User Target. Dec 3 01:41:58 localhost systemd[4176]: Created slice User Application Slice. Dec 3 01:41:58 localhost systemd[4176]: Started Mark boot as successful after the user session has run 2 minutes. Dec 3 01:41:58 localhost systemd[4176]: Started Daily Cleanup of User's Temporary Directories. Dec 3 01:41:58 localhost systemd[4176]: Reached target Paths. Dec 3 01:41:58 localhost systemd[4176]: Reached target Timers. Dec 3 01:41:58 localhost systemd[4176]: Starting D-Bus User Message Bus Socket... Dec 3 01:41:58 localhost systemd[4176]: Starting Create User's Volatile Files and Directories... Dec 3 01:41:58 localhost systemd[4176]: Finished Create User's Volatile Files and Directories. Dec 3 01:41:58 localhost systemd[4176]: Listening on D-Bus User Message Bus Socket. Dec 3 01:41:58 localhost systemd[4176]: Reached target Sockets. Dec 3 01:41:58 localhost systemd[4176]: Reached target Basic System. Dec 3 01:41:58 localhost systemd[4176]: Reached target Main User Target. Dec 3 01:41:58 localhost systemd[4176]: Startup finished in 116ms. Dec 3 01:41:58 localhost systemd[1]: Started User Manager for UID 1000. Dec 3 01:41:58 localhost systemd[1]: Started Session 1 of User zuul. Dec 3 01:41:59 localhost python3[4228]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 01:42:05 localhost python3[4246]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 01:42:13 localhost chronyd[766]: Selected source 149.56.19.163 (2.rhel.pool.ntp.org) Dec 3 01:42:15 localhost python3[4299]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 01:42:16 localhost python3[4329]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Dec 3 01:42:19 localhost python3[4345]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:20 localhost python3[4359]: ansible-file Invoked with state=directory path=/home/zuul/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:21 localhost python3[4419]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:42:21 localhost python3[4460]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764744140.8282325-343-5844217056517/source dest=/home/zuul/.ssh/id_rsa mode=384 force=False _original_basename=3eb220408bb347258831b7bb13243a2c_id_rsa follow=False checksum=9b3b0b96dc6fc77189c35f68399e9ed1b064c3ee backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:22 localhost python3[4533]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:42:23 localhost python3[4574]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764744142.4542615-442-253378353171967/source dest=/home/zuul/.ssh/id_rsa.pub mode=420 force=False _original_basename=3eb220408bb347258831b7bb13243a2c_id_rsa.pub follow=False checksum=46a348b05953740ee1ba05abb28a06a2e244afc4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:25 localhost python3[4602]: ansible-ping Invoked with data=pong Dec 3 01:42:27 localhost python3[4616]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 01:42:30 localhost python3[4669]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Dec 3 01:42:32 localhost python3[4691]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:32 localhost python3[4705]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:33 localhost python3[4719]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:34 localhost python3[4733]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:34 localhost python3[4747]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:34 localhost python3[4761]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:37 localhost python3[4777]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:38 localhost python3[4825]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:42:39 localhost python3[4868]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul/.ansible/tmp/ansible-tmp-1764744158.3251534-56-109879285530712/source follow=False _original_basename=mirror_info.sh.j2 checksum=92d92a03afdddee82732741071f662c729080c35 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:40 localhost python3[4896]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA4Z/c9osaGGtU6X8fgELwfj/yayRurfcKA0HMFfdpPxev2dbwljysMuzoVp4OZmW1gvGtyYPSNRvnzgsaabPNKNo2ym5NToCP6UM+KSe93aln4BcM/24mXChYAbXJQ5Bqq/pIzsGs/pKetQN+vwvMxLOwTvpcsCJBXaa981RKML6xj9l/UZ7IIq1HSEKMvPLxZMWdu0Ut8DkCd5F4nOw9Wgml2uYpDCj5LLCrQQ9ChdOMz8hz6SighhNlRpPkvPaet3OXxr/ytFMu7j7vv06CaEnuMMiY2aTWN1Imin9eHAylIqFHta/3gFfQSWt9jXM7owkBLKL7ATzhaAn+fjNupw== arxcruz@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:40 localhost python3[4910]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDS4Fn6k4deCnIlOtLWqZJyksbepjQt04j8Ed8CGx9EKkj0fKiAxiI4TadXQYPuNHMixZy4Nevjb6aDhL5Z906TfvNHKUrjrG7G26a0k8vdc61NEQ7FmcGMWRLwwc6ReDO7lFpzYKBMk4YqfWgBuGU/K6WLKiVW2cVvwIuGIaYrE1OiiX0iVUUk7KApXlDJMXn7qjSYynfO4mF629NIp8FJal38+Kv+HA+0QkE5Y2xXnzD4Lar5+keymiCHRntPppXHeLIRzbt0gxC7v3L72hpQ3BTBEzwHpeS8KY+SX1y5lRMN45thCHfJqGmARJREDjBvWG8JXOPmVIKQtZmVcD5b mandreou@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:41 localhost python3[4924]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9MiLfy30deHA7xPOAlew5qUq3UP2gmRMYJi8PtkjFB20/DKeWwWNnkZPqP9AayruRoo51SIiVg870gbZE2jYl+Ncx/FYDe56JeC3ySZsXoAVkC9bP7gkOGqOmJjirvAgPMI7bogVz8i+66Q4Ar7OKTp3762G4IuWPPEg4ce4Y7lx9qWocZapHYq4cYKMxrOZ7SEbFSATBbe2bPZAPKTw8do/Eny+Hq/LkHFhIeyra6cqTFQYShr+zPln0Cr+ro/pDX3bB+1ubFgTpjpkkkQsLhDfR6cCdCWM2lgnS3BTtYj5Ct9/JRPR5YOphqZz+uB+OEu2IL68hmU9vNTth1KeX rlandy@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:41 localhost python3[4938]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFCbgz8gdERiJlk2IKOtkjQxEXejrio6ZYMJAVJYpOIp raukadah@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:41 localhost python3[4952]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBqb3Q/9uDf4LmihQ7xeJ9gA/STIQUFPSfyyV0m8AoQi bshewale@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:42 localhost python3[4966]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0I8QqQx0Az2ysJt2JuffucLijhBqnsXKEIx5GyHwxVULROa8VtNFXUDH6ZKZavhiMcmfHB2+TBTda+lDP4FldYj06dGmzCY+IYGa+uDRdxHNGYjvCfLFcmLlzRK6fNbTcui+KlUFUdKe0fb9CRoGKyhlJD5GRkM1Dv+Yb6Bj+RNnmm1fVGYxzmrD2utvffYEb0SZGWxq2R9gefx1q/3wCGjeqvufEV+AskPhVGc5T7t9eyZ4qmslkLh1/nMuaIBFcr9AUACRajsvk6mXrAN1g3HlBf2gQlhi1UEyfbqIQvzzFtsbLDlSum/KmKjy818GzvWjERfQ0VkGzCd9bSLVL dviroel@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:42 localhost python3[4980]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 anbanerj@kaermorhen manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:42 localhost python3[4994]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 dasm@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:42 localhost python3[5008]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHUnwjB20UKmsSed9X73eGNV5AOEFccQ3NYrRW776pEk cjeanner manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:43 localhost python3[5022]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDercCMGn8rW1C4P67tHgtflPdTeXlpyUJYH+6XDd2lR jgilaber@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:43 localhost python3[5036]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAMI6kkg9Wg0sG7jIJmyZemEBwUn1yzNpQQd3gnulOmZ adrianfuscoarnejo@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:43 localhost python3[5050]: ansible-authorized_key Invoked with user=zuul state=present key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPijwpQu/3jhhhBZInXNOLEH57DrknPc3PLbsRvYyJIFzwYjX+WD4a7+nGnMYS42MuZk6TJcVqgnqofVx4isoD4= ramishra@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:43 localhost python3[5064]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGpU/BepK3qX0NRf5Np+dOBDqzQEefhNrw2DCZaH3uWW rebtoor@monolith manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:44 localhost python3[5078]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDK0iKdi8jQTpQrDdLVH/AAgLVYyTXF7AQ1gjc/5uT3t ykarel@yatinkarel manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:44 localhost python3[5092]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF/V/cLotA6LZeO32VL45Hd78skuA2lJA425Sm2LlQeZ fmount@horcrux manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:44 localhost python3[5106]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDa7QCjuDMVmRPo1rREbGwzYeBCYVN+Ou/3WKXZEC6Sr manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:44 localhost python3[5120]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 averdagu@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:45 localhost python3[5134]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 ashigupt@ashigupt.remote.csb manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:45 localhost python3[5148]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOKLl0NYKwoZ/JY5KeZU8VwRAggeOxqQJeoqp3dsAaY9 manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:45 localhost python3[5162]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIASASQOH2BcOyLKuuDOdWZlPi2orcjcA8q4400T73DLH evallesp@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:45 localhost python3[5176]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILeBWlamUph+jRKV2qrx1PGU7vWuGIt5+z9k96I8WehW amsinha@amsinha-mac manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:46 localhost python3[5190]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIANvVgvJBlK3gb1yz5uef/JqIGq4HLEmY2dYA8e37swb morenod@redhat-laptop manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:46 localhost python3[5204]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDZdI7t1cxYx65heVI24HTV4F7oQLW1zyfxHreL2TIJKxjyrUUKIFEUmTutcBlJRLNT2Eoix6x1sOw9YrchloCLcn//SGfTElr9mSc5jbjb7QXEU+zJMhtxyEJ1Po3CUGnj7ckiIXw7wcawZtrEOAQ9pH3ExYCJcEMiyNjRQZCxT3tPK+S4B95EWh5Fsrz9CkwpjNRPPH7LigCeQTM3Wc7r97utAslBUUvYceDSLA7rMgkitJE38b7rZBeYzsGQ8YYUBjTCtehqQXxCRjizbHWaaZkBU+N3zkKB6n/iCNGIO690NK7A/qb6msTijiz1PeuM8ThOsi9qXnbX5v0PoTpcFSojV7NHAQ71f0XXuS43FhZctT+Dcx44dT8Fb5vJu2cJGrk+qF8ZgJYNpRS7gPg0EG2EqjK7JMf9ULdjSu0r+KlqIAyLvtzT4eOnQipoKlb/WG5D/0ohKv7OMQ352ggfkBFIQsRXyyTCT98Ft9juqPuahi3CAQmP4H9dyE+7+Kz437PEtsxLmfm6naNmWi7Ee1DqWPwS8rEajsm4sNM4wW9gdBboJQtc0uZw0DfLj1I9r3Mc8Ol0jYtz0yNQDSzVLrGCaJlC311trU70tZ+ZkAVV6Mn8lOhSbj1cK0lvSr6ZK4dgqGl3I1eTZJJhbLNdg7UOVaiRx9543+C/p/As7w== brjackma@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:46 localhost python3[5218]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKwedoZ0TWPJX/z/4TAbO/kKcDZOQVgRH0hAqrL5UCI1 vcastell@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:46 localhost python3[5232]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEmv8sE8GCk6ZTPIqF0FQrttBdL3mq7rCm/IJy0xDFh7 michburk@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:47 localhost python3[5246]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICy6GpGEtwevXEEn4mmLR5lmSLe23dGgAvzkB9DMNbkf rsafrono@rsafrono manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:55 localhost python3[5262]: ansible-community.general.timezone Invoked with name=UTC hwclock=None Dec 3 01:42:55 localhost systemd[1]: Starting Time & Date Service... Dec 3 01:42:55 localhost systemd[1]: Started Time & Date Service. Dec 3 01:42:55 localhost systemd-timedated[5264]: Changed time zone to 'UTC' (UTC). Dec 3 01:42:57 localhost python3[5283]: ansible-file Invoked with path=/etc/nodepool state=directory mode=511 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:58 localhost python3[5329]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:42:58 localhost python3[5370]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes src=/home/zuul/.ansible/tmp/ansible-tmp-1764744178.1202946-454-152498848366307/source _original_basename=tmpwicm9uu3 follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:59 localhost python3[5430]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:43:00 localhost python3[5471]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes_private src=/home/zuul/.ansible/tmp/ansible-tmp-1764744179.6250236-542-262495045409411/source _original_basename=tmp7x1cr16i follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:43:01 localhost python3[5534]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:43:02 localhost python3[5577]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/node_private src=/home/zuul/.ansible/tmp/ansible-tmp-1764744181.527929-686-158821861811892/source _original_basename=tmp_gc8s__r follow=False checksum=dbfbf8d503ec9dc3cc74020a84f16a6d71ecb5c9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:43:03 localhost python3[5605]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa /etc/nodepool/id_rsa zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:43:03 localhost python3[5621]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa.pub /etc/nodepool/id_rsa.pub zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:43:04 localhost python3[5671]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/zuul-sudo-grep follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:43:05 localhost python3[5714]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/zuul-sudo-grep mode=288 src=/home/zuul/.ansible/tmp/ansible-tmp-1764744184.4245617-813-252891933450306/source _original_basename=tmpdvntoahn follow=False checksum=bdca1a77493d00fb51567671791f4aa30f66c2f0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:43:06 localhost python3[5745]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/visudo -c zuul_log_id=fa163e3b-3c83-e553-08c0-000000000023-1-overcloudcontroller1 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:43:07 localhost python3[5763]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=env#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-e553-08c0-000000000024-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Dec 3 01:43:10 localhost python3[5781]: ansible-file Invoked with path=/home/zuul/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:43:25 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Dec 3 01:43:28 localhost python3[5799]: ansible-ansible.builtin.file Invoked with path=/etc/ci/env state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:44:12 localhost systemd[4176]: Starting Mark boot as successful... Dec 3 01:44:12 localhost systemd[4176]: Finished Mark boot as successful. Dec 3 01:44:28 localhost systemd-logind[760]: Session 1 logged out. Waiting for processes to exit. Dec 3 01:45:01 localhost systemd[1]: Unmounting EFI System Partition Automount... Dec 3 01:45:01 localhost systemd[1]: efi.mount: Deactivated successfully. Dec 3 01:45:01 localhost systemd[1]: Unmounted EFI System Partition Automount. Dec 3 01:45:48 localhost kernel: pci 0000:00:07.0: [1af4:1000] type 00 class 0x020000 Dec 3 01:45:48 localhost kernel: pci 0000:00:07.0: reg 0x10: [io 0x0000-0x003f] Dec 3 01:45:48 localhost kernel: pci 0000:00:07.0: reg 0x14: [mem 0x00000000-0x00000fff] Dec 3 01:45:48 localhost kernel: pci 0000:00:07.0: reg 0x20: [mem 0x00000000-0x00003fff 64bit pref] Dec 3 01:45:48 localhost kernel: pci 0000:00:07.0: reg 0x30: [mem 0x00000000-0x0007ffff pref] Dec 3 01:45:48 localhost kernel: pci 0000:00:07.0: BAR 6: assigned [mem 0xc0000000-0xc007ffff pref] Dec 3 01:45:48 localhost kernel: pci 0000:00:07.0: BAR 4: assigned [mem 0x440000000-0x440003fff 64bit pref] Dec 3 01:45:48 localhost kernel: pci 0000:00:07.0: BAR 1: assigned [mem 0xc0080000-0xc0080fff] Dec 3 01:45:48 localhost kernel: pci 0000:00:07.0: BAR 0: assigned [io 0x1000-0x103f] Dec 3 01:45:48 localhost kernel: virtio-pci 0000:00:07.0: enabling device (0000 -> 0003) Dec 3 01:45:49 localhost NetworkManager[789]: [1764744349.0086] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Dec 3 01:45:49 localhost systemd-udevd[5805]: Network interface NamePolicy= disabled on kernel command line. Dec 3 01:45:49 localhost NetworkManager[789]: [1764744349.0223] device (eth1): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Dec 3 01:45:49 localhost NetworkManager[789]: [1764744349.0261] settings: (eth1): created default wired connection 'Wired connection 1' Dec 3 01:45:49 localhost NetworkManager[789]: [1764744349.0269] device (eth1): carrier: link connected Dec 3 01:45:49 localhost NetworkManager[789]: [1764744349.0273] device (eth1): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Dec 3 01:45:49 localhost NetworkManager[789]: [1764744349.0282] policy: auto-activating connection 'Wired connection 1' (a33ff9e7-c0f6-3a83-91a0-1c51b483cc74) Dec 3 01:45:49 localhost NetworkManager[789]: [1764744349.0290] device (eth1): Activation: starting connection 'Wired connection 1' (a33ff9e7-c0f6-3a83-91a0-1c51b483cc74) Dec 3 01:45:49 localhost NetworkManager[789]: [1764744349.0292] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Dec 3 01:45:49 localhost NetworkManager[789]: [1764744349.0301] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Dec 3 01:45:49 localhost NetworkManager[789]: [1764744349.0310] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Dec 3 01:45:49 localhost NetworkManager[789]: [1764744349.0316] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Dec 3 01:45:49 localhost sshd[5808]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:45:49 localhost systemd-logind[760]: New session 3 of user zuul. Dec 3 01:45:49 localhost systemd[1]: Started Session 3 of User zuul. Dec 3 01:45:50 localhost kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready Dec 3 01:45:50 localhost python3[5825]: ansible-ansible.legacy.command Invoked with _raw_params=ip -j link zuul_log_id=fa163e3b-3c83-b201-178d-0000000002c1-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:45:58 localhost sshd[5828]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:45:59 localhost sshd[5830]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:01 localhost sshd[5832]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:02 localhost sshd[5834]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:03 localhost python3[5883]: ansible-ansible.legacy.stat Invoked with path=/etc/NetworkManager/system-connections/ci-private-network.nmconnection follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:46:03 localhost python3[5926]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764744362.9642324-333-230291596163468/source dest=/etc/NetworkManager/system-connections/ci-private-network.nmconnection mode=0600 owner=root group=root follow=False _original_basename=bootstrap-ci-network-nm-connection.nmconnection.j2 checksum=de7e42af62ae2864f00ede1d1e5174a3baa9b716 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:46:04 localhost python3[5956]: ansible-ansible.builtin.systemd Invoked with name=NetworkManager state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 01:46:04 localhost systemd[1]: NetworkManager-wait-online.service: Deactivated successfully. Dec 3 01:46:04 localhost systemd[1]: Stopped Network Manager Wait Online. Dec 3 01:46:04 localhost systemd[1]: Stopping Network Manager Wait Online... Dec 3 01:46:04 localhost NetworkManager[789]: [1764744364.1980] caught SIGTERM, shutting down normally. Dec 3 01:46:04 localhost systemd[1]: Stopping Network Manager... Dec 3 01:46:04 localhost NetworkManager[789]: [1764744364.2094] dhcp4 (eth0): canceled DHCP transaction Dec 3 01:46:04 localhost NetworkManager[789]: [1764744364.2095] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Dec 3 01:46:04 localhost NetworkManager[789]: [1764744364.2095] dhcp4 (eth0): state changed no lease Dec 3 01:46:04 localhost NetworkManager[789]: [1764744364.2099] manager: NetworkManager state is now CONNECTING Dec 3 01:46:04 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 3 01:46:04 localhost NetworkManager[789]: [1764744364.2185] dhcp4 (eth1): canceled DHCP transaction Dec 3 01:46:04 localhost NetworkManager[789]: [1764744364.2185] dhcp4 (eth1): state changed no lease Dec 3 01:46:04 localhost NetworkManager[789]: [1764744364.2273] exiting (success) Dec 3 01:46:04 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Dec 3 01:46:04 localhost systemd[1]: NetworkManager.service: Deactivated successfully. Dec 3 01:46:04 localhost systemd[1]: Stopped Network Manager. Dec 3 01:46:04 localhost systemd[1]: NetworkManager.service: Consumed 1.650s CPU time. Dec 3 01:46:04 localhost systemd[1]: Starting Network Manager... Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.2891] NetworkManager (version 1.42.2-1.el9) is starting... (after a restart, boot:e368b8ce-f6ac-4f40-b33d-b54584550d8b) Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.2893] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Dec 3 01:46:04 localhost systemd[1]: Started Network Manager. Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.2916] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Dec 3 01:46:04 localhost systemd[1]: Starting Network Manager Wait Online... Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.2966] manager[0x55d21267e090]: monitoring kernel firmware directory '/lib/firmware'. Dec 3 01:46:04 localhost systemd[1]: Starting Hostname Service... Dec 3 01:46:04 localhost systemd[1]: Started Hostname Service. Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3771] hostname: hostname: using hostnamed Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3774] hostname: static hostname changed from (none) to "np0005543226.novalocal" Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3782] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3787] manager[0x55d21267e090]: rfkill: Wi-Fi hardware radio set enabled Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3788] manager[0x55d21267e090]: rfkill: WWAN hardware radio set enabled Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3823] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3824] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3825] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3826] manager: Networking is enabled by state file Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3833] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3834] settings: Loaded settings plugin: keyfile (internal) Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3876] dhcp: init: Using DHCP client 'internal' Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3880] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3888] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3895] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3906] device (lo): Activation: starting connection 'lo' (f43b831f-e499-4112-8ffb-bc410ff3f2af) Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3915] device (eth0): carrier: link connected Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3920] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3927] manager: (eth0): assume: will attempt to assume matching connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) (indicated) Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3928] device (eth0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3936] device (eth0): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3946] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3953] device (eth1): carrier: link connected Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3959] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3967] manager: (eth1): assume: will attempt to assume matching connection 'Wired connection 1' (a33ff9e7-c0f6-3a83-91a0-1c51b483cc74) (indicated) Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3967] device (eth1): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3975] device (eth1): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.3984] device (eth1): Activation: starting connection 'Wired connection 1' (a33ff9e7-c0f6-3a83-91a0-1c51b483cc74) Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4009] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4013] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4016] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4019] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4023] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4025] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4028] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4031] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4038] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4042] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4052] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4055] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4114] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4121] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4128] device (lo): Activation: successful, device activated. Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4136] dhcp4 (eth0): state changed new lease, address=38.102.83.136 Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4140] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4228] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4266] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4268] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4273] manager: NetworkManager state is now CONNECTED_SITE Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4277] device (eth0): Activation: successful, device activated. Dec 3 01:46:04 localhost NetworkManager[5970]: [1764744364.4282] manager: NetworkManager state is now CONNECTED_GLOBAL Dec 3 01:46:04 localhost python3[6025]: ansible-ansible.legacy.command Invoked with _raw_params=ip route zuul_log_id=fa163e3b-3c83-b201-178d-00000000010a-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:46:05 localhost sshd[6040]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:06 localhost sshd[6042]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:08 localhost sshd[6044]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:09 localhost sshd[6046]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:10 localhost sshd[6048]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:12 localhost sshd[6050]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:13 localhost sshd[6052]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:14 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 3 01:46:15 localhost sshd[6054]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:16 localhost sshd[6056]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:21 localhost sshd[6058]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:22 localhost sshd[6060]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:34 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 3 01:46:49 localhost NetworkManager[5970]: [1764744409.8022] device (eth1): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:49 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 3 01:46:49 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Dec 3 01:46:49 localhost NetworkManager[5970]: [1764744409.8248] device (eth1): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:49 localhost NetworkManager[5970]: [1764744409.8253] device (eth1): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:49 localhost NetworkManager[5970]: [1764744409.8265] device (eth1): Activation: successful, device activated. Dec 3 01:46:49 localhost NetworkManager[5970]: [1764744409.8274] manager: startup complete Dec 3 01:46:49 localhost systemd[1]: Finished Network Manager Wait Online. Dec 3 01:46:59 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 3 01:47:04 localhost systemd[1]: session-3.scope: Deactivated successfully. Dec 3 01:47:04 localhost systemd[1]: session-3.scope: Consumed 1.436s CPU time. Dec 3 01:47:04 localhost systemd-logind[760]: Session 3 logged out. Waiting for processes to exit. Dec 3 01:47:04 localhost systemd-logind[760]: Removed session 3. Dec 3 01:47:12 localhost systemd[4176]: Created slice User Background Tasks Slice. Dec 3 01:47:12 localhost systemd[4176]: Starting Cleanup of User's Temporary Files and Directories... Dec 3 01:47:12 localhost systemd[4176]: Finished Cleanup of User's Temporary Files and Directories. Dec 3 01:49:03 localhost sshd[6081]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:49:03 localhost systemd-logind[760]: New session 4 of user zuul. Dec 3 01:49:03 localhost systemd[1]: Started Session 4 of User zuul. Dec 3 01:49:03 localhost python3[6132]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/env/networking-info.yml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:49:03 localhost python3[6175]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/env/networking-info.yml owner=root group=root mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1764744543.3605983-628-67473297899422/source _original_basename=tmpdbgp9pf2 follow=False checksum=d2d04de4e9682d62b2573337e7b0c42a9a07ab3d backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:49:11 localhost systemd[1]: session-4.scope: Deactivated successfully. Dec 3 01:49:11 localhost systemd-logind[760]: Session 4 logged out. Waiting for processes to exit. Dec 3 01:49:11 localhost systemd-logind[760]: Removed session 4. Dec 3 01:56:12 localhost systemd[1]: Starting Cleanup of Temporary Directories... Dec 3 01:56:12 localhost systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Dec 3 01:56:12 localhost systemd[1]: Finished Cleanup of Temporary Directories. Dec 3 01:56:12 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Dec 3 01:56:18 localhost sshd[6197]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:56:19 localhost systemd-logind[760]: New session 5 of user zuul. Dec 3 01:56:19 localhost systemd[1]: Started Session 5 of User zuul. Dec 3 01:56:19 localhost python3[6216]: ansible-ansible.legacy.command Invoked with _raw_params=lsblk -nd -o MAJ:MIN /dev/vda#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-ef11-07b0-000000001d0c-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:30 localhost python3[6235]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/init.scope state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:30 localhost python3[6251]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/machine.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:30 localhost python3[6267]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/system.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:31 localhost python3[6283]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/user.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:32 localhost python3[6299]: ansible-ansible.builtin.file Invoked with path=/etc/systemd/system.conf.d state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:33 localhost python3[6347]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system.conf.d/override.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:56:33 localhost python3[6390]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system.conf.d/override.conf mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1764744993.034148-603-77483729781199/source _original_basename=tmpdli8s_ux follow=False checksum=a05098bd3d2321238ea1169d0e6f135b35b392d4 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:35 localhost python3[6420]: ansible-ansible.builtin.systemd_service Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Dec 3 01:56:35 localhost systemd[1]: Reloading. Dec 3 01:56:35 localhost systemd-rc-local-generator[6439]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 01:56:35 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 01:56:37 localhost python3[6466]: ansible-ansible.builtin.wait_for Invoked with path=/sys/fs/cgroup/system.slice/io.max state=present timeout=30 host=127.0.0.1 connect_timeout=5 delay=0 active_connection_states=['ESTABLISHED', 'FIN_WAIT1', 'FIN_WAIT2', 'SYN_RECV', 'SYN_SENT', 'TIME_WAIT'] sleep=1 port=None search_regex=None exclude_hosts=None msg=None Dec 3 01:56:37 localhost python3[6482]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/init.scope/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:38 localhost python3[6500]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/machine.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:38 localhost python3[6518]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/system.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:38 localhost python3[6536]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/user.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:40 localhost python3[6553]: ansible-ansible.legacy.command Invoked with _raw_params=echo "init"; cat /sys/fs/cgroup/init.scope/io.max; echo "machine"; cat /sys/fs/cgroup/machine.slice/io.max; echo "system"; cat /sys/fs/cgroup/system.slice/io.max; echo "user"; cat /sys/fs/cgroup/user.slice/io.max;#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-ef11-07b0-000000001d13-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:51 localhost python3[6573]: ansible-ansible.builtin.stat Invoked with path=/sys/fs/cgroup/kubepods.slice/io.max follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 01:56:54 localhost systemd[1]: session-5.scope: Deactivated successfully. Dec 3 01:56:54 localhost systemd[1]: session-5.scope: Consumed 3.855s CPU time. Dec 3 01:56:54 localhost systemd-logind[760]: Session 5 logged out. Waiting for processes to exit. Dec 3 01:56:54 localhost systemd-logind[760]: Removed session 5. Dec 3 01:58:10 localhost sshd[6580]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:58:10 localhost systemd-logind[760]: New session 6 of user zuul. Dec 3 01:58:10 localhost systemd[1]: Started Session 6 of User zuul. Dec 3 01:58:11 localhost systemd[1]: Starting RHSM dbus service... Dec 3 01:58:11 localhost systemd[1]: Started RHSM dbus service. Dec 3 01:58:11 localhost rhsm-service[6604]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:11 localhost rhsm-service[6604]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:11 localhost rhsm-service[6604]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:11 localhost rhsm-service[6604]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:13 localhost rhsm-service[6604]: INFO [subscription_manager.managerlib:90] Consumer created: np0005543226.novalocal (18bf20b8-2691-44f6-aea1-681782216598) Dec 3 01:58:13 localhost subscription-manager[6604]: Registered system with identity: 18bf20b8-2691-44f6-aea1-681782216598 Dec 3 01:58:13 localhost rhsm-service[6604]: INFO [subscription_manager.entcertlib:131] certs updated: Dec 3 01:58:13 localhost rhsm-service[6604]: Total updates: 1 Dec 3 01:58:13 localhost rhsm-service[6604]: Found (local) serial# [] Dec 3 01:58:13 localhost rhsm-service[6604]: Expected (UEP) serial# [6296726769006965986] Dec 3 01:58:13 localhost rhsm-service[6604]: Added (new) Dec 3 01:58:13 localhost rhsm-service[6604]: [sn:6296726769006965986 ( Content Access,) @ /etc/pki/entitlement/6296726769006965986.pem] Dec 3 01:58:13 localhost rhsm-service[6604]: Deleted (rogue): Dec 3 01:58:13 localhost rhsm-service[6604]: Dec 3 01:58:13 localhost subscription-manager[6604]: Added subscription for 'Content Access' contract 'None' Dec 3 01:58:13 localhost subscription-manager[6604]: Added subscription for product ' Content Access' Dec 3 01:58:14 localhost rhsm-service[6604]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:14 localhost rhsm-service[6604]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:15 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:58:15 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:58:15 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:58:15 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:58:15 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:58:22 localhost python3[6695]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163e3b-3c83-ef61-b9c4-00000000000d-1-overcloudcontroller1 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:58:24 localhost python3[6714]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 01:58:54 localhost setsebool[6789]: The virt_use_nfs policy boolean was changed to 1 by root Dec 3 01:58:54 localhost setsebool[6789]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Dec 3 01:59:03 localhost kernel: SELinux: Converting 407 SID table entries... Dec 3 01:59:03 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 01:59:03 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 01:59:03 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 01:59:03 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 01:59:03 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 01:59:03 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 01:59:03 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 01:59:15 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=3 res=1 Dec 3 01:59:15 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 01:59:15 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 01:59:15 localhost systemd[1]: Reloading. Dec 3 01:59:15 localhost systemd-rc-local-generator[7689]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 01:59:15 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 01:59:16 localhost systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 01:59:17 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:59:24 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 01:59:24 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 01:59:24 localhost systemd[1]: man-db-cache-update.service: Consumed 10.383s CPU time. Dec 3 01:59:24 localhost systemd[1]: run-r673c225ec8304fdd945bca2292be093e.service: Deactivated successfully. Dec 3 02:00:13 localhost podman[18383]: 2025-12-03 07:00:13.497141689 +0000 UTC m=+0.085327393 system refresh Dec 3 02:00:14 localhost systemd[4176]: Starting D-Bus User Message Bus... Dec 3 02:00:14 localhost dbus-broker-launch[18442]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Dec 3 02:00:14 localhost dbus-broker-launch[18442]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Dec 3 02:00:14 localhost systemd[4176]: Started D-Bus User Message Bus. Dec 3 02:00:14 localhost journal[18442]: Ready Dec 3 02:00:14 localhost systemd[4176]: selinux: avc: op=load_policy lsm=selinux seqno=3 res=1 Dec 3 02:00:14 localhost systemd[4176]: Created slice Slice /user. Dec 3 02:00:14 localhost systemd[4176]: podman-18424.scope: unit configures an IP firewall, but not running as root. Dec 3 02:00:14 localhost systemd[4176]: (This warning is only shown for the first unit using IP firewalling.) Dec 3 02:00:14 localhost systemd[4176]: Started podman-18424.scope. Dec 3 02:00:14 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 02:00:14 localhost systemd[4176]: Started podman-pause-5103b13e.scope. Dec 3 02:00:17 localhost systemd[1]: session-6.scope: Deactivated successfully. Dec 3 02:00:17 localhost systemd[1]: session-6.scope: Consumed 50.107s CPU time. Dec 3 02:00:17 localhost systemd-logind[760]: Session 6 logged out. Waiting for processes to exit. Dec 3 02:00:17 localhost systemd-logind[760]: Removed session 6. Dec 3 02:00:32 localhost sshd[18446]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:32 localhost sshd[18444]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:32 localhost sshd[18447]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:32 localhost sshd[18445]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:32 localhost sshd[18448]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:38 localhost sshd[18454]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:38 localhost systemd-logind[760]: New session 7 of user zuul. Dec 3 02:00:38 localhost systemd[1]: Started Session 7 of User zuul. Dec 3 02:00:38 localhost python3[18471]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPQSwfFxvY+jBWbbYO4QiRXKuP8EaSYDx+BvbwNKUrEzFdLhHdowabjwGeAW/HzM13HZM4Kh3Din31Kyrzy2isM= zuul@np0005543222.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:00:39 localhost python3[18487]: ansible-ansible.posix.authorized_key Invoked with user=root key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPQSwfFxvY+jBWbbYO4QiRXKuP8EaSYDx+BvbwNKUrEzFdLhHdowabjwGeAW/HzM13HZM4Kh3Din31Kyrzy2isM= zuul@np0005543222.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:00:41 localhost systemd[1]: session-7.scope: Deactivated successfully. Dec 3 02:00:41 localhost systemd-logind[760]: Session 7 logged out. Waiting for processes to exit. Dec 3 02:00:41 localhost systemd-logind[760]: Removed session 7. Dec 3 02:02:09 localhost sshd[18505]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:02:09 localhost systemd-logind[760]: New session 8 of user zuul. Dec 3 02:02:09 localhost systemd[1]: Started Session 8 of User zuul. Dec 3 02:02:10 localhost python3[18524]: ansible-authorized_key Invoked with user=root manage_dir=True key=ssh-rsa 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 zuul-build-sshkey state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:02:11 localhost python3[18540]: ansible-user Invoked with name=root state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005543226.novalocal update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Dec 3 02:02:12 localhost python3[18590]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:02:12 localhost python3[18633]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764745331.8994288-93-186832667894342/source dest=/root/.ssh/id_rsa mode=384 owner=root force=False _original_basename=3eb220408bb347258831b7bb13243a2c_id_rsa follow=False checksum=9b3b0b96dc6fc77189c35f68399e9ed1b064c3ee backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:14 localhost python3[18695]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:02:14 localhost python3[18738]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764745333.790405-181-163769645101912/source dest=/root/.ssh/id_rsa.pub mode=420 owner=root force=False _original_basename=3eb220408bb347258831b7bb13243a2c_id_rsa.pub follow=False checksum=46a348b05953740ee1ba05abb28a06a2e244afc4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:16 localhost python3[18768]: ansible-ansible.builtin.file Invoked with path=/etc/nodepool state=directory mode=0777 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:17 localhost python3[18814]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:02:18 localhost python3[18830]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes _original_basename=tmpq9d_a3tv recurse=False state=file path=/etc/nodepool/sub_nodes force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:19 localhost python3[18890]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:02:19 localhost python3[18906]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes_private _original_basename=tmpe19blael recurse=False state=file path=/etc/nodepool/sub_nodes_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:20 localhost python3[18966]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:02:21 localhost python3[18982]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/node_private _original_basename=tmpzi426ka1 recurse=False state=file path=/etc/nodepool/node_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:22 localhost systemd-logind[760]: Session 8 logged out. Waiting for processes to exit. Dec 3 02:02:22 localhost systemd[1]: session-8.scope: Deactivated successfully. Dec 3 02:02:22 localhost systemd[1]: session-8.scope: Consumed 3.600s CPU time. Dec 3 02:02:22 localhost systemd-logind[760]: Removed session 8. Dec 3 02:04:40 localhost sshd[18999]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:04:40 localhost systemd-logind[760]: New session 9 of user zuul. Dec 3 02:04:40 localhost systemd[1]: Started Session 9 of User zuul. Dec 3 02:04:40 localhost python3[19045]: ansible-ansible.legacy.command Invoked with _raw_params=hostname _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:05:13 localhost sshd[19047]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:05:14 localhost sshd[19049]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:05:17 localhost sshd[19051]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:05:18 localhost sshd[19053]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:05:19 localhost sshd[19055]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:08:10 localhost sshd[19058]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:08:12 localhost sshd[19061]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:08:13 localhost sshd[19063]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:08:15 localhost sshd[19065]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:08:17 localhost sshd[19067]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:09:40 localhost systemd[1]: session-9.scope: Deactivated successfully. Dec 3 02:09:40 localhost systemd-logind[760]: Session 9 logged out. Waiting for processes to exit. Dec 3 02:09:40 localhost systemd-logind[760]: Removed session 9. Dec 3 02:11:14 localhost sshd[19069]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:11:15 localhost sshd[19071]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:11:17 localhost sshd[19073]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:11:19 localhost sshd[19075]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:11:20 localhost sshd[19077]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:15:37 localhost sshd[19080]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:16:04 localhost sshd[19084]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:16:04 localhost systemd-logind[760]: New session 10 of user zuul. Dec 3 02:16:04 localhost systemd[1]: Started Session 10 of User zuul. Dec 3 02:16:05 localhost python3[19101]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163e3b-3c83-f989-2b4d-00000000000c-1-overcloudcontroller1 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:16:16 localhost python3[19121]: ansible-ansible.legacy.command Invoked with _raw_params=yum clean all zuul_log_id=fa163e3b-3c83-f989-2b4d-00000000000d-1-overcloudcontroller1 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:16:31 localhost python3[19140]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-baseos-eus-rpms'] state=enabled purge=False Dec 3 02:16:34 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:16:34 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:29 localhost python3[19298]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-appstream-eus-rpms'] state=enabled purge=False Dec 3 02:17:31 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:32 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:40 localhost python3[19439]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-highavailability-eus-rpms'] state=enabled purge=False Dec 3 02:17:43 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:43 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:48 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:48 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:12 localhost python3[19774]: ansible-community.general.rhsm_repository Invoked with name=['fast-datapath-for-rhel-9-x86_64-rpms'] state=enabled purge=False Dec 3 02:18:15 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:15 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:20 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:20 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:36 localhost sshd[20095]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:18:43 localhost python3[20112]: ansible-community.general.rhsm_repository Invoked with name=['openstack-17.1-for-rhel-9-x86_64-rpms'] state=enabled purge=False Dec 3 02:18:47 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:47 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:52 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:52 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:19:16 localhost python3[20510]: ansible-ansible.legacy.command Invoked with _raw_params=yum repolist --enabled#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-000000000013-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:19:31 localhost python3[20529]: ansible-ansible.legacy.dnf Invoked with name=['openvswitch', 'os-net-config', 'ansible-core'] state=present update_cache=True allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:19:51 localhost kernel: SELinux: Converting 486 SID table entries... Dec 3 02:19:51 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:19:51 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:19:51 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:19:51 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:19:51 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:19:51 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:19:51 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:19:52 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=4 res=1 Dec 3 02:19:52 localhost systemd[1]: Started daily update of the root trust anchor for DNSSEC. Dec 3 02:19:55 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:19:55 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 02:19:55 localhost systemd[1]: Reloading. Dec 3 02:19:55 localhost systemd-rc-local-generator[21181]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:19:55 localhost systemd-sysv-generator[21184]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:19:55 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:19:55 localhost systemd[1]: Starting dnf makecache... Dec 3 02:19:55 localhost systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 02:19:56 localhost dnf[21389]: Updating Subscription Management repositories. Dec 3 02:19:56 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 02:19:56 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 02:19:56 localhost systemd[1]: run-ra214f8304df44499a6c3012fc71ffb8b.service: Deactivated successfully. Dec 3 02:19:57 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:19:57 localhost rhsm-service[6604]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:19:57 localhost dnf[21389]: Failed determining last makecache time. Dec 3 02:19:58 localhost dnf[21389]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 49 kB/s | 4.5 kB 00:00 Dec 3 02:19:58 localhost dnf[21389]: Red Hat OpenStack Platform 17.1 for RHEL 9 x86_ 53 kB/s | 4.0 kB 00:00 Dec 3 02:19:58 localhost dnf[21389]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 52 kB/s | 4.5 kB 00:00 Dec 3 02:19:58 localhost dnf[21389]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 52 kB/s | 4.1 kB 00:00 Dec 3 02:19:58 localhost dnf[21389]: Red Hat Enterprise Linux 9 for x86_64 - High Av 51 kB/s | 4.0 kB 00:00 Dec 3 02:19:58 localhost dnf[21389]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 47 kB/s | 4.1 kB 00:00 Dec 3 02:19:58 localhost dnf[21389]: Fast Datapath for RHEL 9 x86_64 (RPMs) 54 kB/s | 4.0 kB 00:00 Dec 3 02:19:59 localhost dnf[21389]: Metadata cache created. Dec 3 02:19:59 localhost systemd[1]: dnf-makecache.service: Deactivated successfully. Dec 3 02:19:59 localhost systemd[1]: Finished dnf makecache. Dec 3 02:19:59 localhost systemd[1]: dnf-makecache.service: Consumed 2.763s CPU time. Dec 3 02:20:26 localhost python3[21810]: ansible-ansible.legacy.command Invoked with _raw_params=ansible-galaxy collection install ansible.posix#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-000000000015-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:21:07 localhost python3[21830]: ansible-ansible.builtin.file Invoked with path=/etc/os-net-config state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:21:08 localhost python3[21878]: ansible-ansible.legacy.stat Invoked with path=/etc/os-net-config/tripleo_config.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:21:09 localhost python3[21921]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764746468.3825555-287-110064567313605/source dest=/etc/os-net-config/tripleo_config.yaml mode=None follow=False _original_basename=overcloud_net_config.j2 checksum=c4aca9aeb86d5a72911d87567aeb8f7976c3c1f0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:21:11 localhost python3[21951]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Dec 3 02:21:11 localhost systemd-journald[617]: Field hash table of /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal has a fill level at 89.2 (297 of 333 items), suggesting rotation. Dec 3 02:21:11 localhost systemd-journald[617]: /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal: Journal header limits reached or header out-of-date, rotating. Dec 3 02:21:11 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 02:21:11 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 02:21:11 localhost python3[21972]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-20 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Dec 3 02:21:11 localhost python3[21992]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-21 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Dec 3 02:21:12 localhost python3[22012]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-22 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Dec 3 02:21:12 localhost python3[22032]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-23 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Dec 3 02:21:15 localhost python3[22052]: ansible-ansible.builtin.systemd Invoked with name=network state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:21:15 localhost systemd[1]: Starting LSB: Bring up/down networking... Dec 3 02:21:15 localhost network[22055]: WARN : [network] You are using 'network' service provided by 'network-scripts', which are now deprecated. Dec 3 02:21:15 localhost network[22066]: You are using 'network' service provided by 'network-scripts', which are now deprecated. Dec 3 02:21:15 localhost network[22055]: WARN : [network] 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:15 localhost network[22067]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:15 localhost network[22055]: WARN : [network] It is advised to switch to 'NetworkManager' instead for network management. Dec 3 02:21:15 localhost network[22068]: It is advised to switch to 'NetworkManager' instead for network management. Dec 3 02:21:15 localhost NetworkManager[5970]: [1764746475.3338] audit: op="connections-reload" pid=22096 uid=0 result="success" Dec 3 02:21:15 localhost network[22055]: Bringing up loopback interface: [ OK ] Dec 3 02:21:15 localhost NetworkManager[5970]: [1764746475.5155] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth0" pid=22184 uid=0 result="success" Dec 3 02:21:15 localhost network[22055]: Bringing up interface eth0: [ OK ] Dec 3 02:21:15 localhost systemd[1]: Started LSB: Bring up/down networking. Dec 3 02:21:15 localhost python3[22225]: ansible-ansible.builtin.systemd Invoked with name=openvswitch state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:21:16 localhost systemd[1]: Starting Open vSwitch Database Unit... Dec 3 02:21:16 localhost chown[22229]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Dec 3 02:21:16 localhost ovs-ctl[22234]: /etc/openvswitch/conf.db does not exist ... (warning). Dec 3 02:21:16 localhost ovs-ctl[22234]: Creating empty database /etc/openvswitch/conf.db [ OK ] Dec 3 02:21:16 localhost ovs-ctl[22234]: Starting ovsdb-server [ OK ] Dec 3 02:21:16 localhost ovs-vsctl[22283]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Dec 3 02:21:16 localhost ovs-vsctl[22303]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.6-141.el9fdp "external-ids:system-id=\"663b06dd-eff1-4afc-8ef8-0f011857a1a0\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"rhel\"" "system-version=\"9.2\"" Dec 3 02:21:16 localhost ovs-ctl[22234]: Configuring Open vSwitch system IDs [ OK ] Dec 3 02:21:16 localhost ovs-vsctl[22309]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005543226.novalocal Dec 3 02:21:16 localhost ovs-ctl[22234]: Enabling remote OVSDB managers [ OK ] Dec 3 02:21:16 localhost systemd[1]: Started Open vSwitch Database Unit. Dec 3 02:21:16 localhost systemd[1]: Starting Open vSwitch Delete Transient Ports... Dec 3 02:21:16 localhost systemd[1]: Finished Open vSwitch Delete Transient Ports. Dec 3 02:21:16 localhost systemd[1]: Starting Open vSwitch Forwarding Unit... Dec 3 02:21:16 localhost kernel: openvswitch: Open vSwitch switching datapath Dec 3 02:21:16 localhost ovs-ctl[22353]: Inserting openvswitch module [ OK ] Dec 3 02:21:16 localhost ovs-ctl[22322]: Starting ovs-vswitchd [ OK ] Dec 3 02:21:16 localhost ovs-ctl[22322]: Enabling remote OVSDB managers [ OK ] Dec 3 02:21:16 localhost ovs-vsctl[22371]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005543226.novalocal Dec 3 02:21:16 localhost systemd[1]: Started Open vSwitch Forwarding Unit. Dec 3 02:21:16 localhost systemd[1]: Starting Open vSwitch... Dec 3 02:21:16 localhost systemd[1]: Finished Open vSwitch. Dec 3 02:21:21 localhost python3[22389]: ansible-ansible.legacy.command Invoked with _raw_params=os-net-config -c /etc/os-net-config/tripleo_config.yaml#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-00000000001a-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:21:22 localhost NetworkManager[5970]: [1764746482.1562] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22547 uid=0 result="success" Dec 3 02:21:22 localhost ifup[22548]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:22 localhost ifup[22549]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:22 localhost ifup[22550]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:22 localhost NetworkManager[5970]: [1764746482.1819] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22556 uid=0 result="success" Dec 3 02:21:22 localhost ovs-vsctl[22558]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex other-config:mac-table-size=50000 -- set bridge br-ex other-config:hwaddr=fa:16:3e:13:e3:74 -- set bridge br-ex fail_mode=standalone -- del-controller br-ex Dec 3 02:21:22 localhost NetworkManager[5970]: [1764746482.2071] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Dec 3 02:21:22 localhost kernel: device ovs-system entered promiscuous mode Dec 3 02:21:22 localhost systemd-udevd[22559]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:22 localhost kernel: Timeout policy base is empty Dec 3 02:21:22 localhost kernel: Failed to associated timeout policy `ovs_test_tp' Dec 3 02:21:22 localhost systemd-udevd[22573]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:22 localhost kernel: device br-ex entered promiscuous mode Dec 3 02:21:22 localhost NetworkManager[5970]: [1764746482.2507] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/5) Dec 3 02:21:22 localhost NetworkManager[5970]: [1764746482.2775] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22586 uid=0 result="success" Dec 3 02:21:22 localhost NetworkManager[5970]: [1764746482.2996] device (br-ex): carrier: link connected Dec 3 02:21:25 localhost NetworkManager[5970]: [1764746485.3557] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22615 uid=0 result="success" Dec 3 02:21:25 localhost NetworkManager[5970]: [1764746485.4022] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22630 uid=0 result="success" Dec 3 02:21:25 localhost NET[22655]: /etc/sysconfig/network-scripts/ifup-post : updated /etc/resolv.conf Dec 3 02:21:25 localhost NetworkManager[5970]: [1764746485.4889] device (eth1): state change: activated -> unmanaged (reason 'unmanaged', sys-iface-state: 'managed') Dec 3 02:21:25 localhost NetworkManager[5970]: [1764746485.5005] dhcp4 (eth1): canceled DHCP transaction Dec 3 02:21:25 localhost NetworkManager[5970]: [1764746485.5005] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Dec 3 02:21:25 localhost NetworkManager[5970]: [1764746485.5005] dhcp4 (eth1): state changed no lease Dec 3 02:21:25 localhost NetworkManager[5970]: [1764746485.5060] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22664 uid=0 result="success" Dec 3 02:21:25 localhost ifup[22665]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:25 localhost ifup[22666]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:25 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 3 02:21:25 localhost ifup[22668]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:25 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Dec 3 02:21:25 localhost NetworkManager[5970]: [1764746485.5429] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22681 uid=0 result="success" Dec 3 02:21:25 localhost NetworkManager[5970]: [1764746485.5861] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22692 uid=0 result="success" Dec 3 02:21:25 localhost NetworkManager[5970]: [1764746485.5930] device (eth1): carrier: link connected Dec 3 02:21:25 localhost NetworkManager[5970]: [1764746485.6151] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22701 uid=0 result="success" Dec 3 02:21:25 localhost ipv6_wait_tentative[22713]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Dec 3 02:21:26 localhost ipv6_wait_tentative[22718]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Dec 3 02:21:27 localhost NetworkManager[5970]: [1764746487.6826] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22728 uid=0 result="success" Dec 3 02:21:27 localhost ovs-vsctl[22743]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex eth1 -- add-port br-ex eth1 Dec 3 02:21:27 localhost kernel: device eth1 entered promiscuous mode Dec 3 02:21:27 localhost NetworkManager[5970]: [1764746487.7755] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22750 uid=0 result="success" Dec 3 02:21:27 localhost ifup[22751]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:27 localhost ifup[22752]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:27 localhost ifup[22753]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:27 localhost NetworkManager[5970]: [1764746487.8071] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22759 uid=0 result="success" Dec 3 02:21:27 localhost NetworkManager[5970]: [1764746487.8489] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22769 uid=0 result="success" Dec 3 02:21:27 localhost ifup[22770]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:27 localhost ifup[22771]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:27 localhost ifup[22772]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:27 localhost NetworkManager[5970]: [1764746487.8812] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22778 uid=0 result="success" Dec 3 02:21:27 localhost ovs-vsctl[22781]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Dec 3 02:21:27 localhost kernel: device vlan44 entered promiscuous mode Dec 3 02:21:27 localhost NetworkManager[5970]: [1764746487.9228] manager: (vlan44): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Dec 3 02:21:27 localhost systemd-udevd[22783]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:27 localhost NetworkManager[5970]: [1764746487.9491] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22792 uid=0 result="success" Dec 3 02:21:27 localhost NetworkManager[5970]: [1764746487.9707] device (vlan44): carrier: link connected Dec 3 02:21:31 localhost NetworkManager[5970]: [1764746491.0243] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22821 uid=0 result="success" Dec 3 02:21:31 localhost NetworkManager[5970]: [1764746491.0706] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22836 uid=0 result="success" Dec 3 02:21:31 localhost NetworkManager[5970]: [1764746491.1195] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22857 uid=0 result="success" Dec 3 02:21:31 localhost ifup[22858]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:31 localhost ifup[22859]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:31 localhost ifup[22860]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:31 localhost NetworkManager[5970]: [1764746491.1508] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22866 uid=0 result="success" Dec 3 02:21:31 localhost ovs-vsctl[22869]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Dec 3 02:21:31 localhost kernel: device vlan21 entered promiscuous mode Dec 3 02:21:31 localhost NetworkManager[5970]: [1764746491.1930] manager: (vlan21): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Dec 3 02:21:31 localhost systemd-udevd[22871]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:31 localhost NetworkManager[5970]: [1764746491.2173] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22881 uid=0 result="success" Dec 3 02:21:31 localhost NetworkManager[5970]: [1764746491.2381] device (vlan21): carrier: link connected Dec 3 02:21:34 localhost NetworkManager[5970]: [1764746494.2869] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22911 uid=0 result="success" Dec 3 02:21:34 localhost NetworkManager[5970]: [1764746494.3334] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22926 uid=0 result="success" Dec 3 02:21:34 localhost NetworkManager[5970]: [1764746494.3957] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22947 uid=0 result="success" Dec 3 02:21:34 localhost ifup[22948]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:34 localhost ifup[22949]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:34 localhost ifup[22950]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:34 localhost NetworkManager[5970]: [1764746494.4288] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22956 uid=0 result="success" Dec 3 02:21:34 localhost ovs-vsctl[22959]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Dec 3 02:21:34 localhost systemd-udevd[22961]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:34 localhost kernel: device vlan20 entered promiscuous mode Dec 3 02:21:34 localhost NetworkManager[5970]: [1764746494.4729] manager: (vlan20): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Dec 3 02:21:34 localhost NetworkManager[5970]: [1764746494.4990] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22971 uid=0 result="success" Dec 3 02:21:34 localhost NetworkManager[5970]: [1764746494.5199] device (vlan20): carrier: link connected Dec 3 02:21:35 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 3 02:21:37 localhost NetworkManager[5970]: [1764746497.5667] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23001 uid=0 result="success" Dec 3 02:21:37 localhost NetworkManager[5970]: [1764746497.6049] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23016 uid=0 result="success" Dec 3 02:21:37 localhost NetworkManager[5970]: [1764746497.6506] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23037 uid=0 result="success" Dec 3 02:21:37 localhost ifup[23038]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:37 localhost ifup[23039]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:37 localhost ifup[23040]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:37 localhost NetworkManager[5970]: [1764746497.6730] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23046 uid=0 result="success" Dec 3 02:21:37 localhost ovs-vsctl[23049]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Dec 3 02:21:37 localhost kernel: device vlan22 entered promiscuous mode Dec 3 02:21:37 localhost NetworkManager[5970]: [1764746497.7328] manager: (vlan22): new Generic device (/org/freedesktop/NetworkManager/Devices/9) Dec 3 02:21:37 localhost systemd-udevd[23051]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:37 localhost NetworkManager[5970]: [1764746497.7569] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23061 uid=0 result="success" Dec 3 02:21:37 localhost NetworkManager[5970]: [1764746497.7741] device (vlan22): carrier: link connected Dec 3 02:21:40 localhost NetworkManager[5970]: [1764746500.8320] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23091 uid=0 result="success" Dec 3 02:21:40 localhost NetworkManager[5970]: [1764746500.8818] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23106 uid=0 result="success" Dec 3 02:21:40 localhost NetworkManager[5970]: [1764746500.9488] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23127 uid=0 result="success" Dec 3 02:21:40 localhost ifup[23128]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:40 localhost ifup[23129]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:40 localhost ifup[23130]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:40 localhost NetworkManager[5970]: [1764746500.9839] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23136 uid=0 result="success" Dec 3 02:21:41 localhost ovs-vsctl[23139]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Dec 3 02:21:41 localhost systemd-udevd[23141]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:41 localhost kernel: device vlan23 entered promiscuous mode Dec 3 02:21:41 localhost NetworkManager[5970]: [1764746501.0274] manager: (vlan23): new Generic device (/org/freedesktop/NetworkManager/Devices/10) Dec 3 02:21:41 localhost NetworkManager[5970]: [1764746501.0538] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23151 uid=0 result="success" Dec 3 02:21:41 localhost NetworkManager[5970]: [1764746501.0760] device (vlan23): carrier: link connected Dec 3 02:21:44 localhost NetworkManager[5970]: [1764746504.1319] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23181 uid=0 result="success" Dec 3 02:21:44 localhost NetworkManager[5970]: [1764746504.1817] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23196 uid=0 result="success" Dec 3 02:21:44 localhost NetworkManager[5970]: [1764746504.2436] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23217 uid=0 result="success" Dec 3 02:21:44 localhost ifup[23218]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:44 localhost ifup[23219]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:44 localhost ifup[23220]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:44 localhost NetworkManager[5970]: [1764746504.2756] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23226 uid=0 result="success" Dec 3 02:21:44 localhost ovs-vsctl[23229]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Dec 3 02:21:44 localhost NetworkManager[5970]: [1764746504.3443] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23236 uid=0 result="success" Dec 3 02:21:45 localhost NetworkManager[5970]: [1764746505.4067] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23263 uid=0 result="success" Dec 3 02:21:45 localhost NetworkManager[5970]: [1764746505.4510] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23278 uid=0 result="success" Dec 3 02:21:45 localhost NetworkManager[5970]: [1764746505.5092] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23299 uid=0 result="success" Dec 3 02:21:45 localhost ifup[23300]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:45 localhost ifup[23301]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:45 localhost ifup[23302]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:45 localhost NetworkManager[5970]: [1764746505.5366] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23308 uid=0 result="success" Dec 3 02:21:45 localhost ovs-vsctl[23311]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Dec 3 02:21:45 localhost NetworkManager[5970]: [1764746505.6318] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23318 uid=0 result="success" Dec 3 02:21:46 localhost NetworkManager[5970]: [1764746506.6979] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23346 uid=0 result="success" Dec 3 02:21:46 localhost NetworkManager[5970]: [1764746506.7455] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23361 uid=0 result="success" Dec 3 02:21:46 localhost NetworkManager[5970]: [1764746506.8069] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23382 uid=0 result="success" Dec 3 02:21:46 localhost ifup[23383]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:46 localhost ifup[23384]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:46 localhost ifup[23385]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:46 localhost NetworkManager[5970]: [1764746506.8395] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23391 uid=0 result="success" Dec 3 02:21:46 localhost ovs-vsctl[23394]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Dec 3 02:21:46 localhost NetworkManager[5970]: [1764746506.8977] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23401 uid=0 result="success" Dec 3 02:21:47 localhost NetworkManager[5970]: [1764746507.9538] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23429 uid=0 result="success" Dec 3 02:21:47 localhost NetworkManager[5970]: [1764746507.9963] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23444 uid=0 result="success" Dec 3 02:21:48 localhost NetworkManager[5970]: [1764746508.0605] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23465 uid=0 result="success" Dec 3 02:21:48 localhost ifup[23466]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:48 localhost ifup[23467]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:48 localhost ifup[23468]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:48 localhost NetworkManager[5970]: [1764746508.0939] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23474 uid=0 result="success" Dec 3 02:21:48 localhost ovs-vsctl[23477]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Dec 3 02:21:48 localhost NetworkManager[5970]: [1764746508.1934] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23484 uid=0 result="success" Dec 3 02:21:49 localhost NetworkManager[5970]: [1764746509.2539] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23512 uid=0 result="success" Dec 3 02:21:49 localhost NetworkManager[5970]: [1764746509.3005] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23527 uid=0 result="success" Dec 3 02:21:49 localhost NetworkManager[5970]: [1764746509.3606] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23548 uid=0 result="success" Dec 3 02:21:49 localhost ifup[23549]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:49 localhost ifup[23550]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:49 localhost ifup[23551]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:49 localhost NetworkManager[5970]: [1764746509.3870] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23557 uid=0 result="success" Dec 3 02:21:49 localhost ovs-vsctl[23560]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Dec 3 02:21:49 localhost NetworkManager[5970]: [1764746509.4214] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23567 uid=0 result="success" Dec 3 02:21:50 localhost NetworkManager[5970]: [1764746510.4743] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23595 uid=0 result="success" Dec 3 02:21:50 localhost NetworkManager[5970]: [1764746510.5110] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23610 uid=0 result="success" Dec 3 02:22:50 localhost systemd[1]: session-10.scope: Deactivated successfully. Dec 3 02:22:50 localhost systemd[1]: session-10.scope: Consumed 1min 42.639s CPU time. Dec 3 02:22:50 localhost systemd-logind[760]: Session 10 logged out. Waiting for processes to exit. Dec 3 02:22:50 localhost systemd-logind[760]: Removed session 10. Dec 3 02:22:52 localhost sshd[23629]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:22:52 localhost systemd-logind[760]: New session 11 of user zuul. Dec 3 02:22:52 localhost systemd[1]: Started Session 11 of User zuul. Dec 3 02:22:52 localhost python3[23646]: ansible-ansible.legacy.command Invoked with _raw_params=ip a#012ping -c 2 -W 2 192.168.122.10#012ping -c 2 -W 2 192.168.122.11#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-00000000001b-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:23:09 localhost python3[23665]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:23:10 localhost python3[23681]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:23:11 localhost python3[23695]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:23:12 localhost python3[23711]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDGubqW6Tr0tDqoZvUu/bxJsqy4cocS8W6FV4CM95kfJlirsolfU35ZLVxzkDyUnHaRj2bs6Ygy8qJxfLK0mSzgYLtTd3ZvC6VayZMbDuT44khGCkPQrlRcQBmhHVHeaT4gZw5z/jjNJPjpw/QLpY/BbAOUZY6OsuF+LbyP0/EF2vOepqRxTHXLDMhjEgeQQ1hwWT/s0dG6PmkNVutgDCjhsFXEX4pQsxcGYyq+YASQWGHxr5xcLOcSHw/57QWvJvKuJjhGGFRCpiLNVGKh3rnCNKcaan4h/onUmg6Syw7OLF0gddKoui7m3CkNkHdvoYYmyDmGW1pEhwIEzDEZc/UcPSWS4bSIuNBL6BJ2S7+x4Pkh5iOi9ZpfrC0qnNO8eUGCappY/M520m1IOZMjIfcIsYzm+U+FBgN+DPWPeaGYIbC/E29whTF3mIWWUNIX4tLNK1+3VqJFSqSBEJDiX3IkfOK1tkDxZuYgcs8DzSidhiqgLjUhH8/tJW+Od8Qzp9U= zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:23:13 localhost python3[23725]: ansible-ansible.builtin.slurp Invoked with path=/etc/hostname src=/etc/hostname Dec 3 02:23:13 localhost python3[23740]: ansible-ansible.legacy.command Invoked with _raw_params=hostname="np0005543226.novalocal"#012hostname_str_array=(${hostname//./ })#012echo ${hostname_str_array[0]} > /home/zuul/ansible_hostname#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-000000000022-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:23:24 localhost python3[23760]: ansible-ansible.legacy.command Invoked with _raw_params=hostname=$(cat /home/zuul/ansible_hostname)#012hostnamectl hostname "$hostname.ooo.test"#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-000000000023-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:23:24 localhost systemd[1]: Starting Hostname Service... Dec 3 02:23:24 localhost systemd[1]: Started Hostname Service. Dec 3 02:23:24 localhost systemd-hostnamed[23764]: Hostname set to (static) Dec 3 02:23:24 localhost NetworkManager[5970]: [1764746604.6683] hostname: static hostname changed from "np0005543226.novalocal" to "np0005543226.ooo.test" Dec 3 02:23:24 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 3 02:23:24 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Dec 3 02:23:24 localhost sshd[23775]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:23:30 localhost sshd[23777]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:23:34 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 3 02:23:35 localhost systemd[1]: session-11.scope: Deactivated successfully. Dec 3 02:23:35 localhost systemd[1]: session-11.scope: Consumed 2.109s CPU time. Dec 3 02:23:35 localhost systemd-logind[760]: Session 11 logged out. Waiting for processes to exit. Dec 3 02:23:35 localhost systemd-logind[760]: Removed session 11. Dec 3 02:23:37 localhost sshd[23779]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:23:37 localhost systemd-logind[760]: New session 12 of user zuul. Dec 3 02:23:37 localhost systemd[1]: Started Session 12 of User zuul. Dec 3 02:23:37 localhost python3[23796]: ansible-ansible.builtin.slurp Invoked with path=/home/zuul/ansible_hostname src=/home/zuul/ansible_hostname Dec 3 02:23:40 localhost systemd[1]: session-12.scope: Deactivated successfully. Dec 3 02:23:40 localhost systemd-logind[760]: Session 12 logged out. Waiting for processes to exit. Dec 3 02:23:40 localhost systemd-logind[760]: Removed session 12. Dec 3 02:23:54 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 3 02:24:06 localhost sshd[23800]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:24:07 localhost systemd-logind[760]: New session 13 of user zuul. Dec 3 02:24:07 localhost systemd[1]: Started Session 13 of User zuul. Dec 3 02:24:07 localhost python3[23819]: ansible-ansible.legacy.dnf Invoked with name=['ipa-client'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:24:15 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Dec 3 02:24:15 localhost dbus-broker-launch[18442]: Noticed file-system modification, trigger reload. Dec 3 02:24:15 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Dec 3 02:24:15 localhost dbus-broker-launch[18442]: Service file '/usr/share/dbus-1/services/certmonger.service' is not named after the D-Bus name 'org.fedorahosted.certmonger'. Dec 3 02:24:15 localhost dbus-broker-launch[18442]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Dec 3 02:24:15 localhost dbus-broker-launch[18442]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Dec 3 02:24:15 localhost systemd[1]: Reloading. Dec 3 02:24:15 localhost systemd-rc-local-generator[23915]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:24:15 localhost systemd-sysv-generator[23920]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:24:15 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:24:16 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Dec 3 02:24:24 localhost kernel: SELinux: Converting 538 SID table entries... Dec 3 02:24:24 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:24:24 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:24:24 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:24:24 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:24:24 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:24:24 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:24:24 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:24:25 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=5 res=1 Dec 3 02:24:25 localhost systemd[1]: Stopping OpenSSH server daemon... Dec 3 02:24:25 localhost systemd[1]: sshd.service: Deactivated successfully. Dec 3 02:24:25 localhost systemd[1]: Stopped OpenSSH server daemon. Dec 3 02:24:25 localhost systemd[1]: sshd.service: Consumed 2.126s CPU time. Dec 3 02:24:25 localhost systemd[1]: Stopped target sshd-keygen.target. Dec 3 02:24:25 localhost systemd[1]: Stopping sshd-keygen.target... Dec 3 02:24:25 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 02:24:25 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 02:24:25 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 02:24:25 localhost systemd[1]: Reached target sshd-keygen.target. Dec 3 02:24:25 localhost systemd[1]: Starting OpenSSH server daemon... Dec 3 02:24:25 localhost sshd[23956]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:24:25 localhost systemd[1]: Started OpenSSH server daemon. Dec 3 02:24:26 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:24:26 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 02:24:26 localhost systemd[1]: Reloading. Dec 3 02:24:27 localhost systemd-rc-local-generator[24508]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:24:27 localhost systemd-sysv-generator[24512]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:24:27 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:24:27 localhost systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 02:24:27 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:24:28 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 02:24:28 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 02:24:28 localhost systemd[1]: man-db-cache-update.service: Consumed 1.405s CPU time. Dec 3 02:24:28 localhost systemd[1]: run-radec57f7dbf84dfeadb1c9a326b57cc2.service: Deactivated successfully. Dec 3 02:24:28 localhost systemd[1]: run-r63ef7d2efc3a43b597c70223fee7fc42.service: Deactivated successfully. Dec 3 02:25:28 localhost systemd[1]: session-13.scope: Deactivated successfully. Dec 3 02:25:28 localhost systemd[1]: session-13.scope: Consumed 17.318s CPU time. Dec 3 02:25:28 localhost systemd-logind[760]: Session 13 logged out. Waiting for processes to exit. Dec 3 02:25:28 localhost systemd-logind[760]: Removed session 13. Dec 3 02:26:14 localhost sshd[25919]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:26:14 localhost systemd-logind[760]: New session 14 of user zuul. Dec 3 02:26:14 localhost systemd[1]: Started Session 14 of User zuul. Dec 3 02:26:15 localhost python3[25970]: ansible-ansible.legacy.stat Invoked with path=/etc/resolv.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:26:15 localhost python3[26015]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764746774.9225342-62-80940353956541/source dest=/etc/resolv.conf owner=root group=root mode=420 follow=False _original_basename=ipa_resolv_conf.j2 checksum=edbe9a45130a7ebff5948216d04bc5bb05808e49 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:26:20 localhost python3[26045]: ansible-ansible.legacy.command Invoked with _raw_params=ip route add 10.255.255.25 via 192.168.122.100 dev br-ex _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:26:21 localhost python3[26063]: ansible-ansible.builtin.file Invoked with path=/etc/pki/CA state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:27:22 localhost systemd[1]: session-14.scope: Deactivated successfully. Dec 3 02:27:22 localhost systemd[1]: session-14.scope: Consumed 1.140s CPU time. Dec 3 02:27:22 localhost systemd-logind[760]: Session 14 logged out. Waiting for processes to exit. Dec 3 02:27:22 localhost systemd-logind[760]: Removed session 14. Dec 3 02:35:57 localhost sshd[26066]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:35:57 localhost sshd[26067]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:37:18 localhost sshd[26069]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:37:19 localhost sshd[26071]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:37:21 localhost sshd[26073]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:37:23 localhost sshd[26075]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:37:24 localhost sshd[26077]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:37:59 localhost sshd[26079]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:38:23 localhost sshd[26081]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:39:01 localhost sshd[26083]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:39:11 localhost sshd[26084]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:39:41 localhost sshd[26086]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:39:43 localhost sshd[26088]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:39:44 localhost sshd[26090]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:39:44 localhost sshd[26091]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:39:46 localhost sshd[26093]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:39:48 localhost sshd[26095]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:40:59 localhost sshd[26101]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:41:37 localhost sshd[26103]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:42:12 localhost sshd[26105]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:42:13 localhost sshd[26107]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:42:41 localhost sshd[26109]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:43:08 localhost sshd[26111]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:43:27 localhost sshd[26113]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:43:28 localhost sshd[26115]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:43:30 localhost sshd[26117]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:43:31 localhost sshd[26119]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:43:32 localhost sshd[26121]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:43:33 localhost sshd[26123]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:43:45 localhost sshd[26125]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:44:01 localhost sshd[26127]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:44:35 localhost sshd[26129]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:44:58 localhost sshd[26131]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:45:07 localhost sshd[26133]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:45:09 localhost sshd[26135]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:45:15 localhost sshd[26138]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:45:18 localhost sshd[26140]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:45:33 localhost sshd[26143]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:45:56 localhost sshd[26145]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:46:11 localhost sshd[26147]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:46:23 localhost sshd[26149]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:46:27 localhost sshd[26152]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:46:29 localhost sshd[26154]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:47:12 localhost sshd[26156]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:47:26 localhost sshd[26158]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:47:26 localhost sshd[26160]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:47:36 localhost sshd[26162]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:47:47 localhost sshd[26164]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:48:08 localhost sshd[26166]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:48:08 localhost sshd[26167]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:48:29 localhost sshd[26168]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:48:37 localhost sshd[26170]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:48:46 localhost sshd[26172]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:48:53 localhost sshd[26174]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:49:07 localhost sshd[26176]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:49:35 localhost sshd[26178]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:49:48 localhost sshd[26180]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:49:51 localhost sshd[26182]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:49:58 localhost sshd[26184]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:50:01 localhost sshd[26186]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:50:03 localhost sshd[26188]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:50:22 localhost sshd[26190]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:50:27 localhost sshd[26192]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:50:54 localhost sshd[26195]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:51:06 localhost sshd[26197]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:51:10 localhost sshd[26199]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:51:12 localhost sshd[26201]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:51:14 localhost sshd[26203]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:51:49 localhost sshd[26205]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:51:57 localhost sshd[26207]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:52:10 localhost sshd[26209]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:52:19 localhost sshd[26211]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:52:19 localhost sshd[26213]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:52:22 localhost sshd[26215]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:52:36 localhost sshd[26218]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:52:52 localhost sshd[26220]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:53:03 localhost sshd[26222]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:53:21 localhost sshd[26224]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:53:22 localhost sshd[26226]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:53:33 localhost sshd[26228]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:53:33 localhost sshd[26230]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:53:57 localhost sshd[26232]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:54:05 localhost sshd[26234]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:54:22 localhost sshd[26236]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:54:23 localhost sshd[26238]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:54:35 localhost sshd[26240]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:54:38 localhost sshd[26242]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:54:38 localhost systemd-logind[760]: New session 15 of user zuul. Dec 3 02:54:38 localhost systemd[1]: Started Session 15 of User zuul. Dec 3 02:54:38 localhost python3[26290]: ansible-ansible.legacy.ping Invoked with data=pong Dec 3 02:54:39 localhost python3[26335]: ansible-setup Invoked with gather_subset=['!facter', '!ohai'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 02:54:40 localhost python3[26355]: ansible-user Invoked with name=tripleo-admin generate_ssh_key=False state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005543226.ooo.test update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Dec 3 02:54:40 localhost systemd-journald[617]: Field hash table of /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal has a fill level at 76.6 (255 of 333 items), suggesting rotation. Dec 3 02:54:40 localhost systemd-journald[617]: /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal: Journal header limits reached or header out-of-date, rotating. Dec 3 02:54:40 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 02:54:40 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 02:54:41 localhost python3[26412]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/tripleo-admin follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:54:41 localhost python3[26455]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/tripleo-admin mode=288 owner=root group=root src=/home/zuul/.ansible/tmp/ansible-tmp-1764748480.717853-81896-176226367844170/source _original_basename=tmpa3dixjs0 follow=False checksum=b3e7ecdcc699d217c6b083a91b07208207813d93 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:54:42 localhost python3[26485]: ansible-file Invoked with path=/home/tripleo-admin state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:54:42 localhost python3[26501]: ansible-file Invoked with path=/home/tripleo-admin/.ssh state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:54:42 localhost python3[26517]: ansible-file Invoked with path=/home/tripleo-admin/.ssh/authorized_keys state=touch owner=tripleo-admin group=tripleo-admin mode=384 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:54:43 localhost python3[26533]: ansible-lineinfile Invoked with path=/home/tripleo-admin/.ssh/authorized_keys line=ssh-rsa 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 zuul-build-sshkey#012 regexp=Generated by TripleO state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:54:44 localhost python3[26547]: ansible-ping Invoked with data=pong Dec 3 02:54:46 localhost sshd[26548]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:54:49 localhost sshd[26550]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:54:55 localhost sshd[26552]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:54:55 localhost systemd-logind[760]: New session 16 of user tripleo-admin. Dec 3 02:54:55 localhost systemd[1]: Created slice User Slice of UID 1002. Dec 3 02:54:55 localhost systemd[1]: Starting User Runtime Directory /run/user/1002... Dec 3 02:54:55 localhost systemd[1]: Finished User Runtime Directory /run/user/1002. Dec 3 02:54:55 localhost systemd[1]: Starting User Manager for UID 1002... Dec 3 02:54:55 localhost systemd[26556]: Queued start job for default target Main User Target. Dec 3 02:54:55 localhost systemd[26556]: Created slice User Application Slice. Dec 3 02:54:55 localhost systemd[26556]: Started Mark boot as successful after the user session has run 2 minutes. Dec 3 02:54:55 localhost systemd[26556]: Started Daily Cleanup of User's Temporary Directories. Dec 3 02:54:55 localhost systemd[26556]: Reached target Paths. Dec 3 02:54:55 localhost systemd[26556]: Reached target Timers. Dec 3 02:54:55 localhost systemd[26556]: Starting D-Bus User Message Bus Socket... Dec 3 02:54:55 localhost systemd[26556]: Starting Create User's Volatile Files and Directories... Dec 3 02:54:55 localhost systemd[26556]: Listening on D-Bus User Message Bus Socket. Dec 3 02:54:55 localhost systemd[26556]: Finished Create User's Volatile Files and Directories. Dec 3 02:54:55 localhost systemd[26556]: Reached target Sockets. Dec 3 02:54:55 localhost systemd[26556]: Reached target Basic System. Dec 3 02:54:55 localhost systemd[26556]: Reached target Main User Target. Dec 3 02:54:55 localhost systemd[26556]: Startup finished in 97ms. Dec 3 02:54:55 localhost systemd[1]: Started User Manager for UID 1002. Dec 3 02:54:55 localhost systemd[1]: Started Session 16 of User tripleo-admin. Dec 3 02:54:56 localhost python3[26617]: ansible-ansible.legacy.setup Invoked with gather_subset=['!all', 'min'] gather_timeout=45 filter=[] fact_path=/etc/ansible/facts.d Dec 3 02:54:56 localhost sshd[26622]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:55:00 localhost python3[26639]: ansible-selinux Invoked with policy=targeted state=enforcing configfile=/etc/selinux/config Dec 3 02:55:01 localhost python3[26655]: ansible-tempfile Invoked with state=file suffix=tmphosts prefix=ansible. path=None Dec 3 02:55:02 localhost python3[26703]: ansible-ansible.legacy.copy Invoked with remote_src=True src=/etc/hosts dest=/tmp/ansible.bpr6ot1itmphosts mode=preserve backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None local_follow=None checksum=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:55:02 localhost python3[26733]: ansible-blockinfile Invoked with state=absent path=/tmp/ansible.bpr6ot1itmphosts block= marker=# {mark} marker_begin=HEAT_HOSTS_START - Do not edit manually within this section! marker_end=HEAT_HOSTS_END create=False backup=False unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:55:03 localhost python3[26749]: ansible-blockinfile Invoked with create=True path=/tmp/ansible.bpr6ot1itmphosts insertbefore=BOF block=172.17.0.106 np0005543228.ooo.test np0005543228#012172.18.0.106 np0005543228.storage.ooo.test np0005543228.storage#012172.17.0.106 np0005543228.internalapi.ooo.test np0005543228.internalapi#012172.19.0.106 np0005543228.tenant.ooo.test np0005543228.tenant#012192.168.122.106 np0005543228.ctlplane.ooo.test np0005543228.ctlplane#012172.17.0.107 np0005543230.ooo.test np0005543230#012172.18.0.107 np0005543230.storage.ooo.test np0005543230.storage#012172.17.0.107 np0005543230.internalapi.ooo.test np0005543230.internalapi#012172.19.0.107 np0005543230.tenant.ooo.test np0005543230.tenant#012192.168.122.107 np0005543230.ctlplane.ooo.test np0005543230.ctlplane#012172.17.0.108 np0005543231.ooo.test np0005543231#012172.18.0.108 np0005543231.storage.ooo.test np0005543231.storage#012172.17.0.108 np0005543231.internalapi.ooo.test np0005543231.internalapi#012172.19.0.108 np0005543231.tenant.ooo.test np0005543231.tenant#012192.168.122.108 np0005543231.ctlplane.ooo.test np0005543231.ctlplane#012172.17.0.103 np0005543225.ooo.test np0005543225#012172.18.0.103 np0005543225.storage.ooo.test np0005543225.storage#012172.20.0.103 np0005543225.storagemgmt.ooo.test np0005543225.storagemgmt#012172.17.0.103 np0005543225.internalapi.ooo.test np0005543225.internalapi#012172.19.0.103 np0005543225.tenant.ooo.test np0005543225.tenant#012172.21.0.103 np0005543225.external.ooo.test np0005543225.external#012192.168.122.103 np0005543225.ctlplane.ooo.test np0005543225.ctlplane#012172.17.0.104 np0005543226.ooo.test np0005543226#012172.18.0.104 np0005543226.storage.ooo.test np0005543226.storage#012172.20.0.104 np0005543226.storagemgmt.ooo.test np0005543226.storagemgmt#012172.17.0.104 np0005543226.internalapi.ooo.test np0005543226.internalapi#012172.19.0.104 np0005543226.tenant.ooo.test np0005543226.tenant#012172.21.0.104 np0005543226.external.ooo.test np0005543226.external#012192.168.122.104 np0005543226.ctlplane.ooo.test np0005543226.ctlplane#012172.17.0.105 np0005543227.ooo.test np0005543227#012172.18.0.105 np0005543227.storage.ooo.test np0005543227.storage#012172.20.0.105 np0005543227.storagemgmt.ooo.test np0005543227.storagemgmt#012172.17.0.105 np0005543227.internalapi.ooo.test np0005543227.internalapi#012172.19.0.105 np0005543227.tenant.ooo.test np0005543227.tenant#012172.21.0.105 np0005543227.external.ooo.test np0005543227.external#012192.168.122.105 np0005543227.ctlplane.ooo.test np0005543227.ctlplane#012#012192.168.122.100 undercloud.ctlplane.ooo.test undercloud.ctlplane#012192.168.122.99 overcloud.ctlplane.ooo.test#012172.18.0.166 overcloud.storage.ooo.test#012172.20.0.188 overcloud.storagemgmt.ooo.test#012172.17.0.147 overcloud.internalapi.ooo.test#012172.21.0.122 overcloud.ooo.test#012 marker=# {mark} marker_begin=START_HOST_ENTRIES_FOR_STACK: overcloud marker_end=END_HOST_ENTRIES_FOR_STACK: overcloud state=present backup=False unsafe_writes=False insertafter=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:55:04 localhost python3[26765]: ansible-ansible.legacy.command Invoked with _raw_params=cp "/tmp/ansible.bpr6ot1itmphosts" "/etc/hosts" _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:55:04 localhost python3[26782]: ansible-file Invoked with path=/tmp/ansible.bpr6ot1itmphosts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:55:05 localhost python3[26798]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides rhosp-release _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:55:06 localhost sshd[26800]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:55:06 localhost sshd[26802]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:55:07 localhost python3[26818]: ansible-ansible.legacy.dnf Invoked with name=['rhosp-release'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:55:12 localhost python3[26838]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:55:12 localhost python3[26855]: ansible-ansible.legacy.dnf Invoked with name=['driverctl', 'lvm2', 'jq', 'nftables', 'openvswitch', 'openstack-heat-agents', 'openstack-selinux', 'os-net-config', 'python3-libselinux', 'python3-pyyaml', 'puppet-tripleo', 'rsync', 'tmpwatch', 'sysstat', 'iproute-tc'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:55:24 localhost systemd[1]: Reloading. Dec 3 02:55:24 localhost systemd-rc-local-generator[27052]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:55:24 localhost systemd-sysv-generator[27055]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:55:24 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:55:24 localhost systemd[1]: Listening on Device-mapper event daemon FIFOs. Dec 3 02:55:28 localhost sshd[27091]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:55:33 localhost systemd[1]: Reloading. Dec 3 02:55:33 localhost systemd-sysv-generator[27124]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:55:33 localhost systemd-rc-local-generator[27121]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:55:33 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:55:33 localhost systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Dec 3 02:55:33 localhost systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Dec 3 02:55:33 localhost systemd[1]: Reloading. Dec 3 02:55:33 localhost systemd-sysv-generator[27164]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:55:33 localhost systemd-rc-local-generator[27159]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:55:33 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:55:33 localhost systemd[1]: Listening on LVM2 poll daemon socket. Dec 3 02:55:35 localhost sshd[27444]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:55:39 localhost sshd[27490]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:55:48 localhost sshd[27539]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:55:54 localhost sshd[27577]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:56:03 localhost sshd[27625]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:56:09 localhost sshd[27630]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:56:23 localhost kernel: SELinux: Converting 2713 SID table entries... Dec 3 02:56:23 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:56:23 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:56:23 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:56:23 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:56:23 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:56:23 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:56:23 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:56:24 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=7 res=1 Dec 3 02:56:24 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:56:24 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 02:56:24 localhost systemd[1]: Reloading. Dec 3 02:56:24 localhost systemd-rc-local-generator[27793]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:56:24 localhost systemd-sysv-generator[27797]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:56:24 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:56:24 localhost systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 02:56:24 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:56:24 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 02:56:24 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 02:56:24 localhost systemd[1]: run-rd973de866ba9452b9329755c45749ac2.service: Deactivated successfully. Dec 3 02:56:24 localhost systemd[1]: run-re38887a1433d4651b4d08aa91f1e77d5.service: Deactivated successfully. Dec 3 02:56:26 localhost python3[28667]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -V driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:27 localhost python3[28806]: ansible-ansible.legacy.systemd Invoked with name=openvswitch enabled=True state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 02:56:28 localhost systemd[1]: Reloading. Dec 3 02:56:28 localhost systemd-sysv-generator[28840]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:56:28 localhost systemd-rc-local-generator[28837]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:56:28 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:56:29 localhost python3[28861]: ansible-file Invoked with path=/var/lib/heat-config/tripleo-config-download state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:29 localhost sshd[28878]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:56:29 localhost python3[28877]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides openstack-network-scripts _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:30 localhost python3[28896]: ansible-systemd Invoked with name=NetworkManager enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Dec 3 02:56:32 localhost python3[28914]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=dns value=none backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:32 localhost python3[28932]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=rc-manager value=unmanaged backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:32 localhost python3[28950]: ansible-ansible.legacy.systemd Invoked with name=NetworkManager state=reloaded daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:56:33 localhost systemd[1]: Reloading Network Manager... Dec 3 02:56:33 localhost NetworkManager[5970]: [1764748593.0354] audit: op="reload" arg="0" pid=28953 uid=0 result="success" Dec 3 02:56:33 localhost NetworkManager[5970]: [1764748593.0362] config: signal: SIGHUP,config-files,values,values-user,no-auto-default,dns-mode,rc-manager (/etc/NetworkManager/NetworkManager.conf (lib: 00-server.conf) (run: 15-carrier-timeout.conf)) Dec 3 02:56:33 localhost NetworkManager[5970]: [1764748593.0362] dns-mgr: init: dns=none,systemd-resolved rc-manager=unmanaged Dec 3 02:56:33 localhost systemd[1]: Reloaded Network Manager. Dec 3 02:56:33 localhost python3[28969]: ansible-ansible.legacy.command Invoked with _raw_params=ln -f -s /usr/share/openstack-puppet/modules/* /etc/puppet/modules/ _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:33 localhost python3[28986]: ansible-stat Invoked with path=/usr/bin/ansible-playbook follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:56:34 localhost python3[29004]: ansible-stat Invoked with path=/usr/bin/ansible-playbook-3 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:56:34 localhost python3[29020]: ansible-file Invoked with state=link src=/usr/bin/ansible-playbook path=/usr/bin/ansible-playbook-3 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:34 localhost sshd[29021]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:56:35 localhost python3[29038]: ansible-tempfile Invoked with state=file prefix=ansible. suffix= path=None Dec 3 02:56:35 localhost python3[29054]: ansible-stat Invoked with path=/etc/ssh/ssh_known_hosts follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:56:36 localhost python3[29070]: ansible-blockinfile Invoked with path=/tmp/ansible.tpz1izg3 block=[192.168.122.106]*,[np0005543228.ctlplane.ooo.test]*,[172.17.0.106]*,[np0005543228.internalapi.ooo.test]*,[172.18.0.106]*,[np0005543228.storage.ooo.test]*,[172.19.0.106]*,[np0005543228.tenant.ooo.test]*,[np0005543228.ooo.test]*,[np0005543228]* ssh-rsa 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#012[192.168.122.107]*,[np0005543230.ctlplane.ooo.test]*,[172.17.0.107]*,[np0005543230.internalapi.ooo.test]*,[172.18.0.107]*,[np0005543230.storage.ooo.test]*,[172.19.0.107]*,[np0005543230.tenant.ooo.test]*,[np0005543230.ooo.test]*,[np0005543230]* ssh-rsa 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#012[192.168.122.108]*,[np0005543231.ctlplane.ooo.test]*,[172.17.0.108]*,[np0005543231.internalapi.ooo.test]*,[172.18.0.108]*,[np0005543231.storage.ooo.test]*,[172.19.0.108]*,[np0005543231.tenant.ooo.test]*,[np0005543231.ooo.test]*,[np0005543231]* ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCYfgWbD1+Ukq1QdHPbEviT6rPT4yo1WbvdHKQQj1mNxGL/5tBxb/RsPtlPDMamSx6herk/OzSA2DWZz9+iF7y1sA2q40tf9FMJ16ym56E1DmSVnaMdRxNcx+IKMOyiWqbq92sC7feHLFydVCEim5mJn8PmRVHYpfaHeZmO82CmUnGjzekYAFa2vLwzfCUKxHzVj2xttzMeBHxxo6YdvuQS+UYiPSF+st2bXdOHH9B7TEtz6oo3OdPHe/LBMWnzp5PghokOt3NwsqFSaRTao/ETUI1hbc+MAP9P3h6F6bkJFUMHMpHLaHv9E5neLwQzDRm6g82yR4vvk4IfEDjyvm3MfPe5WgtTJCNaj6Z1uKxj0jrHAJyj0xasp6PlSpsqSEY/s/ahpW8y44lyHsJmyNvD3YXiG7W+DYN0EjulIHYRMEwAwaOBNFvzQfJbN/kgKXz0S8z8jB6YLLw0xYGDUhJGEmAPdSSdfV/OKJNtKPSxBNcCYrwfl1p8WzT/JVYzytc=#012[192.168.122.103]*,[np0005543225.ctlplane.ooo.test]*,[172.21.0.103]*,[np0005543225.external.ooo.test]*,[172.17.0.103]*,[np0005543225.internalapi.ooo.test]*,[172.18.0.103]*,[np0005543225.storage.ooo.test]*,[172.20.0.103]*,[np0005543225.storagemgmt.ooo.test]*,[172.19.0.103]*,[np0005543225.tenant.ooo.test]*,[np0005543225.ooo.test]*,[np0005543225]* ssh-rsa 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#012[192.168.122.104]*,[np0005543226.ctlplane.ooo.test]*,[172.21.0.104]*,[np0005543226.external.ooo.test]*,[172.17.0.104]*,[np0005543226.internalapi.ooo.test]*,[172.18.0.104]*,[np0005543226.storage.ooo.test]*,[172.20.0.104]*,[np0005543226.storagemgmt.ooo.test]*,[172.19.0.104]*,[np0005543226.tenant.ooo.test]*,[np0005543226.ooo.test]*,[np0005543226]* ssh-rsa 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#012[192.168.122.105]*,[np0005543227.ctlplane.ooo.test]*,[172.21.0.105]*,[np0005543227.external.ooo.test]*,[172.17.0.105]*,[np0005543227.internalapi.ooo.test]*,[172.18.0.105]*,[np0005543227.storage.ooo.test]*,[172.20.0.105]*,[np0005543227.storagemgmt.ooo.test]*,[172.19.0.105]*,[np0005543227.tenant.ooo.test]*,[np0005543227.ooo.test]*,[np0005543227]* ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDh191wJ8CT4bzyEIolgc7DHn5lAYmxfdp3Jjpq39NBvLihwOaVIosb4+pV2EwxK6dXU7jVnm8cyYiC5WeHtuoJju6f1qBFmmNOO8gm/6DnVR49F7isS/J2o42xr1rYsfGCxXs0B3Cvf6ms+ooZ73rnDnXTaGpiXrYeH3Hyj/vnnJagQAk5OnYkdT/ZavqZXeeiyeRCbzBw5+TT/mahnz1xiouAoWrXgo3EJtqB6hVmq/peoMl8ivvs7E6IRHctB8Z3ilWjqE49KXtJ463D2nnkG4J33hmjMej/QpqBZhZ5IPuO3X7An+gSCPnR6kiS7p2vIM+DydR4kN6tzlGjY6JZvyVO9CTuaNm/Y/LtEPoPoecyHs8GyYLWHmpDXPS8+ZXFpIeimvge8dXlbhBb4025KYm6vH21ktRx2CGwWuFdXtQbnm8cxd9mtUB+3O4NpKace0QHUvghR83NwXynZffQMNGnmbpv95JrioE1TRyxPmFTlmaVDTkVdRt3BU0ZkGs=#012 create=True state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:37 localhost python3[29086]: ansible-ansible.legacy.command Invoked with _raw_params=cat '/tmp/ansible.tpz1izg3' > /etc/ssh/ssh_known_hosts _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:37 localhost python3[29104]: ansible-file Invoked with path=/tmp/ansible.tpz1izg3 state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:38 localhost python3[29120]: ansible-file Invoked with path=/var/log/journal state=directory mode=0750 owner=root group=root setype=var_log_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Dec 3 02:56:38 localhost python3[29136]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active cloud-init.service || systemctl is-enabled cloud-init.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:38 localhost python3[29154]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline | grep -q cloud-init=disabled _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:39 localhost python3[29173]: ansible-community.general.cloud_init_data_facts Invoked with filter=status Dec 3 02:56:42 localhost python3[29310]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:42 localhost python3[29327]: ansible-ansible.legacy.dnf Invoked with name=['tuned', 'tuned-profiles-cpu-partitioning'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:56:45 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Dec 3 02:56:45 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Dec 3 02:56:45 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Dec 3 02:56:45 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:56:45 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 02:56:45 localhost systemd[1]: Reloading. Dec 3 02:56:46 localhost systemd-rc-local-generator[29424]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:56:46 localhost systemd-sysv-generator[29432]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:56:46 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:56:46 localhost systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 02:56:46 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Dec 3 02:56:46 localhost systemd[1]: tuned.service: Deactivated successfully. Dec 3 02:56:46 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Dec 3 02:56:46 localhost systemd[1]: tuned.service: Consumed 1.700s CPU time. Dec 3 02:56:46 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Dec 3 02:56:46 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 02:56:46 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 02:56:46 localhost systemd[1]: run-rb9ec959631e14b8d804c0b42500f15e7.service: Deactivated successfully. Dec 3 02:56:47 localhost systemd[1]: Started Dynamic System Tuning Daemon. Dec 3 02:56:47 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:56:47 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 02:56:47 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 02:56:47 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 02:56:47 localhost systemd[1]: run-rfcd004e9a650424a8ecedbd1f61924dc.service: Deactivated successfully. Dec 3 02:56:48 localhost python3[29772]: ansible-systemd Invoked with name=tuned state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 02:56:48 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Dec 3 02:56:48 localhost systemd[1]: tuned.service: Deactivated successfully. Dec 3 02:56:48 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Dec 3 02:56:48 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Dec 3 02:56:50 localhost systemd[1]: Started Dynamic System Tuning Daemon. Dec 3 02:56:50 localhost python3[29968]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:51 localhost python3[29985]: ansible-slurp Invoked with src=/etc/tuned/active_profile Dec 3 02:56:51 localhost python3[30001]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:56:52 localhost python3[30017]: ansible-ansible.legacy.command Invoked with _raw_params=tuned-adm profile throughput-performance _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:53 localhost python3[30037]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:54 localhost python3[30054]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/nova_libvirt/etc/nova/nova.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:56:56 localhost python3[30070]: ansible-replace Invoked with regexp=TRIPLEO_HEAT_TEMPLATE_KERNEL_ARGS dest=/etc/default/grub replace= path=/etc/default/grub backup=False encoding=utf-8 unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:01 localhost python3[30086]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:02 localhost python3[30134]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:02 localhost python3[30179]: ansible-ansible.legacy.copy Invoked with mode=384 dest=/etc/puppet/hiera.yaml src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748621.7938626-87379-263693090422297/source _original_basename=tmpr0ra6lak follow=False checksum=aaf3699defba931d532f4955ae152f505046749a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:02 localhost python3[30209]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:03 localhost python3[30257]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:04 localhost python3[30300]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748623.4719238-87574-248127674717284/source dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json follow=False checksum=0b8212f4500c40b31ba4dd459c2695d956264369 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:04 localhost python3[30362]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:05 localhost python3[30405]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748624.453564-87804-176184631621727/source dest=/etc/puppet/hieradata/bootstrap_node.json mode=None follow=False _original_basename=bootstrap_node.j2 checksum=2c29b36a1551bdd104ca7b81ba27c00dedb68297 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:05 localhost python3[30467]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:06 localhost python3[30510]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748625.420079-87804-251342517465028/source dest=/etc/puppet/hieradata/vip_data.json mode=None follow=False _original_basename=vip_data.j2 checksum=2093b47eb1119a802673002321e960c01a008d59 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:07 localhost python3[30572]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:07 localhost python3[30615]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748626.42371-87804-133474577916534/source dest=/etc/puppet/hieradata/net_ip_map.json mode=None follow=False _original_basename=net_ip_map.j2 checksum=3aa9bde21cec8e8062cc87ae410eab47ae478aa8 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:07 localhost python3[30677]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:08 localhost python3[30720]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748627.6194-87804-30435378056276/source dest=/etc/puppet/hieradata/cloud_domain.json mode=None follow=False _original_basename=cloud_domain.j2 checksum=64f5f309f5137b9e0913cbf22857157ecfa0f1f1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:09 localhost python3[30782]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:09 localhost python3[30825]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748628.6100006-87804-249798487652973/source dest=/etc/puppet/hieradata/fqdn.json mode=None follow=False _original_basename=fqdn.j2 checksum=be7cd6d3defe1708a5d76e6817014a0b7d3da16d backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:09 localhost python3[30887]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:10 localhost python3[30930]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748629.6360962-87804-22557818138394/source dest=/etc/puppet/hieradata/service_names.json mode=None follow=False _original_basename=service_names.j2 checksum=f3a297f9489dbabd957eb904b4140ce21e05b558 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:10 localhost python3[30992]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:11 localhost python3[31035]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748630.5810037-87804-75300025403380/source dest=/etc/puppet/hieradata/service_configs.json mode=None follow=False _original_basename=service_configs.j2 checksum=0c921408d3f2ea7e82fbc791b96f093196f1f642 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:11 localhost python3[31097]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:12 localhost python3[31140]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748631.5282147-87804-62293888508923/source dest=/etc/puppet/hieradata/extraconfig.json mode=None follow=False _original_basename=extraconfig.j2 checksum=5f36b2ea290645ee34d943220a14b54ee5ea5be5 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:12 localhost sshd[31168]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:57:12 localhost systemd[26556]: Starting Mark boot as successful... Dec 3 02:57:12 localhost systemd[26556]: Finished Mark boot as successful. Dec 3 02:57:12 localhost python3[31205]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:13 localhost python3[31248]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748632.4807506-87804-65573511311121/source dest=/etc/puppet/hieradata/role_extraconfig.json mode=None follow=False _original_basename=role_extraconfig.j2 checksum=ad2ff5cbdfc5332b5cb47860d7f73fa8fd81a43a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:13 localhost python3[31310]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:14 localhost python3[31353]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748633.4403253-87804-137540203837998/source dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json mode=None follow=False _original_basename=ovn_chassis_mac_map.j2 checksum=8b45c83644fe30647e45a892e16a4f468dbb34c9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:14 localhost python3[31383]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:57:15 localhost python3[31431]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:15 localhost sshd[31472]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:57:15 localhost python3[31476]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/ansible_managed.json owner=root group=root mode=0644 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748635.219275-89183-62344265188971/source _original_basename=tmpoxaa8zq6 follow=False checksum=bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:16 localhost sshd[31491]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:57:17 localhost sshd[31493]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:57:21 localhost python3[31510]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_default_ipv4'] gather_timeout=10 fact_path=/etc/ansible/facts.d Dec 3 02:57:21 localhost python3[31571]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 38.102.83.1 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:22 localhost sshd[31573]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:57:26 localhost python3[31590]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 192.168.122.10 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:28 localhost sshd[31592]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:57:31 localhost python3[31609]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 192.168.122.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:31 localhost python3[31632]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 192.168.122.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:34 localhost sshd[31634]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:57:36 localhost python3[31651]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.18.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:36 localhost python3[31674]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.18.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:36 localhost sshd[31676]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:57:41 localhost python3[31693]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.18.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:41 localhost sshd[31695]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:57:45 localhost python3[31712]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.20.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:46 localhost python3[31735]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.20.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:50 localhost python3[31752]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.20.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:55 localhost python3[31769]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.17.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:55 localhost python3[31792]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.17.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:00 localhost python3[31809]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.17.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:04 localhost python3[31826]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.19.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:05 localhost python3[31849]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.19.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:06 localhost sshd[31851]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:58:09 localhost python3[31868]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.19.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:14 localhost python3[31885]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.21.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:14 localhost python3[31908]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.21.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:19 localhost python3[31925]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.21.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:21 localhost sshd[31927]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:58:24 localhost python3[31944]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:24 localhost python3[31992]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:24 localhost python3[32010]: ansible-ansible.legacy.file Invoked with mode=384 dest=/etc/puppet/hiera.yaml _original_basename=tmpbd1qzvj1 recurse=False state=file path=/etc/puppet/hiera.yaml force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:25 localhost python3[32040]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:26 localhost python3[32088]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:26 localhost python3[32106]: ansible-ansible.legacy.file Invoked with dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json recurse=False state=file path=/etc/puppet/hieradata/all_nodes.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:27 localhost python3[32168]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:27 localhost python3[32186]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/bootstrap_node.json _original_basename=bootstrap_node.j2 recurse=False state=file path=/etc/puppet/hieradata/bootstrap_node.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:27 localhost python3[32248]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:28 localhost python3[32266]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/vip_data.json _original_basename=vip_data.j2 recurse=False state=file path=/etc/puppet/hieradata/vip_data.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:28 localhost python3[32328]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:29 localhost python3[32346]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/net_ip_map.json _original_basename=net_ip_map.j2 recurse=False state=file path=/etc/puppet/hieradata/net_ip_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:29 localhost python3[32408]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:30 localhost python3[32426]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/cloud_domain.json _original_basename=cloud_domain.j2 recurse=False state=file path=/etc/puppet/hieradata/cloud_domain.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:30 localhost python3[32488]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:30 localhost python3[32506]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/fqdn.json _original_basename=fqdn.j2 recurse=False state=file path=/etc/puppet/hieradata/fqdn.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:31 localhost python3[32568]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:31 localhost python3[32587]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_names.json _original_basename=service_names.j2 recurse=False state=file path=/etc/puppet/hieradata/service_names.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:31 localhost sshd[32634]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:58:32 localhost python3[32651]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:32 localhost python3[32669]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_configs.json _original_basename=service_configs.j2 recurse=False state=file path=/etc/puppet/hieradata/service_configs.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:33 localhost python3[32731]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:33 localhost python3[32749]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/extraconfig.json _original_basename=extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:33 localhost python3[32811]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:34 localhost sshd[32813]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:58:35 localhost python3[32831]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/role_extraconfig.json _original_basename=role_extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/role_extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:35 localhost python3[32893]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:35 localhost sshd[32912]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:58:35 localhost python3[32911]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json _original_basename=ovn_chassis_mac_map.j2 recurse=False state=file path=/etc/puppet/hieradata/ovn_chassis_mac_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:36 localhost python3[32943]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:58:36 localhost python3[32991]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:37 localhost python3[33009]: ansible-ansible.legacy.file Invoked with owner=root group=root mode=0644 dest=/etc/puppet/hieradata/ansible_managed.json _original_basename=tmpbx5uvycw recurse=False state=file path=/etc/puppet/hieradata/ansible_managed.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:37 localhost sshd[33010]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:58:37 localhost sshd[33026]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:58:39 localhost python3[33043]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:58:44 localhost python3[33060]: ansible-ansible.builtin.systemd Invoked with name=iptables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 02:58:44 localhost python3[33078]: ansible-ansible.builtin.systemd Invoked with name=ip6tables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 02:58:45 localhost sshd[33081]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:58:46 localhost python3[33098]: ansible-ansible.builtin.systemd Invoked with name=nftables state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 02:58:46 localhost sshd[33101]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:58:47 localhost systemd[1]: Reloading. Dec 3 02:58:47 localhost systemd-rc-local-generator[33126]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:58:47 localhost systemd-sysv-generator[33130]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:58:47 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:58:47 localhost systemd[1]: Starting Netfilter Tables... Dec 3 02:58:47 localhost systemd[1]: Finished Netfilter Tables. Dec 3 02:58:48 localhost python3[33191]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/iptables.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:48 localhost python3[33234]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/iptables.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748727.8783805-93581-53631249110056/source _original_basename=iptables.nft follow=False checksum=ede9860c99075946a7bc827210247aac639bc84a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:48 localhost python3[33264]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/iptables.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:49 localhost python3[33282]: ansible-ansible.legacy.command Invoked with _raw_params=nft -j list ruleset _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:50 localhost python3[33331]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:50 localhost python3[33374]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748729.7408087-94047-175701942368647/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:51 localhost python3[33436]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-update-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:51 localhost python3[33479]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-update-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748730.8022788-94189-246431077471271/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:52 localhost python3[33541]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-flushes.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:52 localhost python3[33584]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-flushes.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748731.959221-94339-158515366301875/source mode=None follow=False _original_basename=flush-chain.j2 checksum=e8e7b8db0d61a7fe393441cc91613f470eb34a6e backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:53 localhost python3[33646]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-chains.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:53 localhost python3[33689]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-chains.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748732.9712179-94509-76979675556378/source mode=None follow=False _original_basename=chains.j2 checksum=e60ee651f5014e83924f4e901ecc8e25b1906610 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:55 localhost python3[33751]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-rules.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:55 localhost sshd[33765]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:58:55 localhost python3[33796]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-rules.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748733.948221-94587-139385324372991/source mode=None follow=False _original_basename=ruleset.j2 checksum=f3487dfc0a90bd6214637cfa4d839c408ea37185 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:56 localhost python3[33826]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-chains.nft /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft /etc/nftables/tripleo-jumps.nft | nft -c -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:56 localhost python3[33891]: ansible-ansible.builtin.blockinfile Invoked with path=/etc/sysconfig/nftables.conf backup=False validate=nft -c -f %s block=include "/etc/nftables/iptables.nft"#012include "/etc/nftables/tripleo-chains.nft"#012include "/etc/nftables/tripleo-rules.nft"#012include "/etc/nftables/tripleo-jumps.nft"#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK create=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:57 localhost sshd[33909]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:58:57 localhost python3[33908]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/tripleo-chains.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:57 localhost python3[33927]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft | nft -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:58 localhost python3[33946]: ansible-file Invoked with mode=0750 path=/var/log/containers/ceilometer setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:58:58 localhost python3[33962]: ansible-seboolean Invoked with name=virt_sandbox_use_netlink persistent=True state=True ignore_selinux_state=False Dec 3 02:58:59 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=8 res=1 Dec 3 02:58:59 localhost python3[33982]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:58:59 localhost python3[33998]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/cinder-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:00 localhost python3[34014]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/cinder(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 02:59:00 localhost kernel: SELinux: Converting 2717 SID table entries... Dec 3 02:59:00 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:59:00 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:59:00 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:59:00 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:59:00 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:59:00 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:59:00 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:59:01 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=9 res=1 Dec 3 02:59:01 localhost python3[34035]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:01 localhost python3[34051]: ansible-file Invoked with path=/var/lib/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:02 localhost python3[34067]: ansible-file Invoked with path=/var/lib/tripleo-config/ceph state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:02 localhost python3[34083]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:03 localhost python3[34099]: ansible-ansible.legacy.dnf Invoked with name=['lvm2'] state=latest allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:59:06 localhost python3[34116]: ansible-ansible.legacy.command Invoked with creates=/var/lib/cinder/cinder-volumes _raw_params=dd if=/dev/zero of=/var/lib/cinder/cinder-volumes bs=1 count=0 seek=20480M _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 3 02:59:06 localhost python3[34133]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=exit_code=0#012existing_device=$(losetup -j /var/lib/cinder/cinder-volumes -l -n -O NAME)#012if [[ -z "${existing_device}" ]]; then#012 losetup -f /var/lib/cinder/cinder-volumes --show#012 exit_code=2#012else#012 echo ${existing_device%$'\n'*}#012fi#012exit ${exit_code} _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Dec 3 02:59:06 localhost kernel: loop: module loaded Dec 3 02:59:06 localhost kernel: loop0: detected capacity change from 0 to 41943040 Dec 3 02:59:07 localhost python3[34158]: ansible-community.general.lvg Invoked with pvs=['/dev/loop0'] state=present vg=cinder-volumes pesize=4 pv_options= pvresize=False vg_options= force=False Dec 3 02:59:07 localhost lvm[34162]: PV /dev/loop0 not used. Dec 3 02:59:07 localhost lvm[34164]: PV /dev/loop0 online, VG cinder-volumes is complete. Dec 3 02:59:07 localhost systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Dec 3 02:59:07 localhost lvm[34166]: 0 logical volume(s) in volume group "cinder-volumes" now active Dec 3 02:59:07 localhost systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Dec 3 02:59:07 localhost python3[34214]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/cinder-lvm-losetup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:08 localhost python3[34257]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system/cinder-lvm-losetup.service src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748747.487008-95279-8757408719175/source _original_basename=tmp_7msrphx follow=False checksum=b96c2f9cc51ddf9c35f8cfb4cbac820751f42aef backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:08 localhost python3[34287]: ansible-systemd Invoked with daemon_reload=True enabled=True name=cinder-lvm-losetup daemon_reexec=False scope=system no_block=False state=None force=None masked=None Dec 3 02:59:09 localhost systemd[1]: Reloading. Dec 3 02:59:09 localhost systemd-sysv-generator[34317]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:59:09 localhost systemd-rc-local-generator[34314]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:59:09 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:59:09 localhost systemd[1]: Reloading. Dec 3 02:59:09 localhost systemd-rc-local-generator[34349]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:59:09 localhost systemd-sysv-generator[34356]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:59:09 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:59:09 localhost python3[34377]: ansible-file Invoked with mode=0750 path=/var/log/containers/collectd setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:10 localhost python3[34393]: ansible-file Invoked with mode=0755 path=/var/lib/container-user-scripts/ setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:10 localhost python3[34409]: ansible-file Invoked with mode=0750 path=/var/log/containers/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:10 localhost python3[34425]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:11 localhost python3[34441]: ansible-file Invoked with path=/var/lib/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:11 localhost python3[34457]: ansible-file Invoked with mode=0750 path=/var/log/containers/haproxy setype=var_log_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:12 localhost python3[34473]: ansible-file Invoked with path=/var/lib/haproxy setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:17 localhost python3[34619]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:17 localhost python3[34635]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:18 localhost python3[34651]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:18 localhost python3[34667]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api-cfn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:18 localhost python3[34683]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:19 localhost python3[34699]: ansible-file Invoked with mode=0750 path=/var/log/containers/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:19 localhost python3[34715]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:19 localhost python3[34731]: ansible-file Invoked with path=/var/www setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:19 localhost python3[34747]: ansible-file Invoked with mode=01777 path=/var/tmp/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:20 localhost python3[34795]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/var-tmp-horizon.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:20 localhost python3[34838]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/var-tmp-horizon.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748760.1362443-96363-65839026809695/source _original_basename=tmpik43qk7x follow=False checksum=804a78abbf39204f4c8abd5e4269fa10d8cb9df3 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:21 localhost python3[34868]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 02:59:22 localhost kernel: SELinux: Converting 2721 SID table entries... Dec 3 02:59:22 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:59:22 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:59:22 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:59:22 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:59:22 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:59:22 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:59:22 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:59:22 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=10 res=1 Dec 3 02:59:22 localhost python3[34892]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/target(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 02:59:23 localhost kernel: SELinux: Converting 2721 SID table entries... Dec 3 02:59:23 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:59:23 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:59:23 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:59:23 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:59:23 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:59:23 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:59:23 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:59:23 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=11 res=1 Dec 3 02:59:24 localhost python3[34913]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 02:59:24 localhost kernel: SELinux: Converting 2721 SID table entries... Dec 3 02:59:24 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:59:24 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:59:24 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:59:24 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:59:24 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:59:24 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:59:24 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:59:25 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=12 res=1 Dec 3 02:59:25 localhost python3[34935]: ansible-file Invoked with path=/etc/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:25 localhost python3[34951]: ansible-file Invoked with path=/etc/target setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:26 localhost python3[34967]: ansible-file Invoked with path=/var/lib/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:26 localhost python3[34983]: ansible-stat Invoked with path=/lib/systemd/system/iscsid.socket follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:59:26 localhost python3[34999]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-enabled --quiet iscsi.service _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:59:27 localhost python3[35016]: ansible-ansible.legacy.dnf Invoked with name=['dracut-config-generic'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:59:28 localhost sshd[35018]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:59:31 localhost python3[35035]: ansible-file Invoked with path=/etc/modules-load.d state=directory mode=493 owner=root group=root setype=etc_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:31 localhost python3[35083]: ansible-ansible.legacy.stat Invoked with path=/etc/modules-load.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:32 localhost python3[35126]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748771.3357446-97144-216507783509121/source dest=/etc/modules-load.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-modprobe.conf.j2 checksum=8021efe01721d8fa8cab46b95c00ec1be6dbb9d0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:32 localhost python3[35156]: ansible-systemd Invoked with name=systemd-modules-load.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:59:32 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 3 02:59:32 localhost systemd[1]: Stopped Load Kernel Modules. Dec 3 02:59:32 localhost systemd[1]: Stopping Load Kernel Modules... Dec 3 02:59:32 localhost systemd[1]: Starting Load Kernel Modules... Dec 3 02:59:32 localhost kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 3 02:59:32 localhost kernel: Bridge firewalling registered Dec 3 02:59:32 localhost systemd-modules-load[35159]: Inserted module 'br_netfilter' Dec 3 02:59:32 localhost systemd-modules-load[35159]: Module 'msr' is built in Dec 3 02:59:32 localhost systemd[1]: Finished Load Kernel Modules. Dec 3 02:59:33 localhost python3[35210]: ansible-ansible.legacy.stat Invoked with path=/etc/sysctl.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:33 localhost python3[35253]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748772.837032-97251-251641468321887/source dest=/etc/sysctl.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-sysctl.conf.j2 checksum=cddb9401fdafaaf28a4a94b98448f98ae93c94c9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:34 localhost python3[35283]: ansible-sysctl Invoked with name=fs.inotify.max_user_instances value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:34 localhost python3[35301]: ansible-sysctl Invoked with name=kernel.pid_max value=1048576 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:34 localhost python3[35319]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-arptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:34 localhost python3[35336]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-ip6tables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:35 localhost python3[35353]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-iptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:35 localhost python3[35370]: ansible-sysctl Invoked with name=net.ipv4.conf.all.rp_filter value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:35 localhost python3[35388]: ansible-sysctl Invoked with name=net.ipv4.ip_forward value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:36 localhost python3[35406]: ansible-sysctl Invoked with name=net.ipv4.ip_local_reserved_ports value=35357,49000-49001 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:36 localhost python3[35424]: ansible-sysctl Invoked with name=net.ipv4.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:36 localhost python3[35442]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh1 value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:37 localhost python3[35460]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh2 value=2048 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:37 localhost python3[35478]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh3 value=4096 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:37 localhost python3[35496]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:38 localhost python3[35513]: ansible-sysctl Invoked with name=net.ipv6.conf.all.forwarding value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:38 localhost python3[35530]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:38 localhost python3[35547]: ansible-sysctl Invoked with name=net.ipv6.conf.lo.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:39 localhost python3[35564]: ansible-sysctl Invoked with name=net.ipv6.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:39 localhost python3[35582]: ansible-systemd Invoked with name=systemd-sysctl.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:59:39 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 3 02:59:39 localhost systemd[1]: Stopped Apply Kernel Variables. Dec 3 02:59:39 localhost systemd[1]: Stopping Apply Kernel Variables... Dec 3 02:59:39 localhost systemd[1]: Starting Apply Kernel Variables... Dec 3 02:59:39 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 3 02:59:39 localhost systemd[1]: Finished Apply Kernel Variables. Dec 3 02:59:39 localhost python3[35602]: ansible-file Invoked with mode=0750 path=/var/log/containers/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:40 localhost python3[35618]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:40 localhost python3[35634]: ansible-stat Invoked with path=/etc/openldap/certs/certs_valid follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:59:40 localhost python3[35650]: ansible-stat Invoked with path=/etc/openldap/certs/cert9.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:59:41 localhost python3[35666]: ansible-stat Invoked with path=/etc/openldap/certs/key4.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:59:41 localhost python3[35682]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:41 localhost python3[35698]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/manila-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:42 localhost python3[35714]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:42 localhost python3[35730]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:42 localhost python3[35746]: ansible-file Invoked with path=/var/lib/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:43 localhost python3[35762]: ansible-file Invoked with mode=0750 path=/var/log/containers/memcached setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:43 localhost python3[35778]: ansible-file Invoked with mode=0750 path=/var/log/containers/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:44 localhost python3[35794]: ansible-file Invoked with path=/var/lib/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:44 localhost python3[35810]: ansible-file Invoked with mode=0750 path=/var/log/containers/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:44 localhost python3[35826]: ansible-file Invoked with path=/var/lib/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:45 localhost python3[35842]: ansible-file Invoked with mode=0750 path=/var/log/mariadb setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:45 localhost python3[35858]: ansible-file Invoked with mode=0750 path=/var/log/containers/neutron setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:45 localhost python3[35874]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/neutron-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:46 localhost python3[35890]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:46 localhost python3[35906]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:46 localhost python3[35922]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:46 localhost sshd[35923]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:59:47 localhost python3[35940]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:47 localhost python3[35956]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-metadata setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:47 localhost python3[35972]: ansible-group Invoked with gid=107 name=qemu state=present system=False local=False non_unique=False Dec 3 02:59:48 localhost sshd[35995]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:59:48 localhost python3[35994]: ansible-user Invoked with comment=qemu user group=qemu name=qemu shell=/sbin/nologin state=present uid=107 non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005543226.ooo.test update_password=always groups=None home=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Dec 3 02:59:48 localhost sshd[36005]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:59:48 localhost python3[36022]: ansible-seboolean Invoked with name=logrotate_read_inside_containers persistent=True state=True ignore_selinux_state=False Dec 3 02:59:49 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=13 res=1 Dec 3 02:59:49 localhost python3[36045]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:50 localhost python3[36061]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:50 localhost python3[36077]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:50 localhost python3[36093]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:51 localhost python3[36141]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/neutron-cleanup follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:51 localhost python3[36184]: ansible-ansible.legacy.copy Invoked with dest=/usr/libexec/neutron-cleanup force=True mode=0755 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748790.933501-98881-254937962330441/source _original_basename=tmpclxz0ox0 follow=False checksum=f9cc7d1e91fbae49caa7e35eb2253bba146a73b4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:52 localhost python3[36246]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/neutron-cleanup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:52 localhost python3[36289]: ansible-ansible.legacy.copy Invoked with dest=/usr/lib/systemd/system/neutron-cleanup.service force=True src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748791.9114668-98986-217058996203849/source _original_basename=tmp1k3mf3w4 follow=False checksum=6b6cd9f074903a28d054eb530a10c7235d0c39fc backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:53 localhost python3[36319]: ansible-ansible.legacy.systemd Invoked with enabled=True name=neutron-cleanup daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Dec 3 02:59:53 localhost systemd[1]: Reloading. Dec 3 02:59:53 localhost systemd-sysv-generator[36349]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:59:53 localhost systemd-rc-local-generator[36345]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:59:53 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:59:53 localhost sshd[36358]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:59:54 localhost python3[36375]: ansible-ansible.builtin.lineinfile Invoked with path=/etc/systemd/logind.conf regexp=^\s*#?\s*HandlePowerKey\s*=.* state=absent backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None line=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:54 localhost python3[36391]: ansible-ansible.builtin.lineinfile Invoked with line=HandlePowerKey=ignore path=/etc/systemd/logind.conf regexp=^#?HandlePowerKey state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:54 localhost python3[36407]: ansible-ansible.legacy.systemd Invoked with name=systemd-logind state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:59:54 localhost systemd[1]: Stopping User Login Management... Dec 3 02:59:54 localhost systemd[1]: systemd-logind.service: Deactivated successfully. Dec 3 02:59:54 localhost systemd[1]: Stopped User Login Management. Dec 3 02:59:54 localhost systemd[1]: Starting Load Kernel Module drm... Dec 3 02:59:54 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 3 02:59:54 localhost systemd[1]: Finished Load Kernel Module drm. Dec 3 02:59:54 localhost systemd[1]: Starting User Login Management... Dec 3 02:59:55 localhost systemd-logind[36415]: New seat seat0. Dec 3 02:59:55 localhost systemd-logind[36415]: Watching system buttons on /dev/input/event0 (Power Button) Dec 3 02:59:55 localhost systemd-logind[36415]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Dec 3 02:59:55 localhost systemd[1]: Started User Login Management. Dec 3 02:59:55 localhost systemd-logind[36415]: New session 15 of user zuul. Dec 3 02:59:55 localhost systemd-logind[36415]: New session 16 of user tripleo-admin. Dec 3 02:59:55 localhost python3[36431]: ansible-file Invoked with mode=0750 path=/var/log/containers/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:55 localhost python3[36447]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:56 localhost python3[36463]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/rabbitmq(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 02:59:57 localhost kernel: SELinux: Converting 2721 SID table entries... Dec 3 02:59:57 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:59:57 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:59:57 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:59:57 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:59:57 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:59:57 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:59:57 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:59:57 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=14 res=1 Dec 3 02:59:57 localhost python3[36484]: ansible-file Invoked with path=/var/lib/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:57 localhost python3[36500]: ansible-file Invoked with mode=0750 path=/var/log/containers/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:58 localhost python3[36516]: ansible-ansible.legacy.command Invoked with _raw_params=echo 'export ERL_EPMD_ADDRESS=127.0.0.1' > /etc/rabbitmq/rabbitmq-env.conf#012echo 'export ERL_EPMD_PORT=4370' >> /etc/rabbitmq/rabbitmq-env.conf#012for pid in $(pgrep epmd --ns 1 --nslist pid); do kill $pid; done#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:59:58 localhost sshd[36519]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:59:58 localhost sshd[36534]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:59:59 localhost python3[36538]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 03:00:02 localhost python3[36557]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_interfaces'] gather_timeout=10 fact_path=/etc/ansible/facts.d Dec 3 03:00:02 localhost python3[36618]: ansible-file Invoked with path=/etc/containers/networks state=directory recurse=True mode=493 owner=root group=root force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:03 localhost python3[36634]: ansible-ansible.legacy.command Invoked with _raw_params=podman network inspect podman#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:03 localhost systemd[26556]: Created slice User Background Tasks Slice. Dec 3 03:00:03 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 03:00:03 localhost systemd[26556]: Starting Cleanup of User's Temporary Files and Directories... Dec 3 03:00:03 localhost systemd[26556]: Finished Cleanup of User's Temporary Files and Directories. Dec 3 03:00:03 localhost python3[36693]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/networks/podman.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:04 localhost python3[36736]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748803.368126-99646-248844427841180/source dest=/etc/containers/networks/podman.json mode=0644 owner=root group=root follow=False _original_basename=podman_network_config.j2 checksum=5d334c1c0238fd030ff0aa07124be03224538bdb backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:04 localhost python3[36798]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/registries.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:05 localhost python3[36843]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748804.4429483-99712-269383673061261/source dest=/etc/containers/registries.conf owner=root group=root setype=etc_t mode=0644 follow=False _original_basename=registries.conf.j2 checksum=710a00cfb11a4c3eba9c028ef1984a9fea9ba83a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:05 localhost python3[36873]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=containers option=pids_limit value=4096 backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:06 localhost python3[36889]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=events_logger value="journald" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:06 localhost python3[36905]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=runtime value="crun" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:06 localhost python3[36921]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=network option=network_backend value="netavark" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:06 localhost sshd[36922]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:00:07 localhost python3[36971]: ansible-ansible.legacy.stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:07 localhost python3[37014]: ansible-ansible.legacy.copy Invoked with dest=/etc/sysconfig/podman_drop_in src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748806.966061-99895-233412774336436/source _original_basename=tmpjp06s6kg follow=False checksum=0bfbc70e9a4740c9004b9947da681f723d529c83 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:08 localhost python3[37044]: ansible-file Invoked with path=/var/lib/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:08 localhost python3[37060]: ansible-file Invoked with mode=0750 path=/var/log/containers/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:09 localhost python3[37076]: ansible-file Invoked with path=/run/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:09 localhost python3[37124]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/run-redis.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:10 localhost python3[37167]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/run-redis.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748809.4771035-100117-134339409286440/source _original_basename=tmpg5hx7a8e follow=False checksum=07018f7099c8edadf6a52c86069ae4e2a9407b28 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:10 localhost python3[37197]: ansible-file Invoked with mode=0750 path=/var/log/containers/rsyslog setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:10 localhost python3[37213]: ansible-file Invoked with path=/var/lib/rsyslog.container setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:11 localhost python3[37229]: ansible-ansible.legacy.dnf Invoked with name=['openssh-server'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 03:00:19 localhost sshd[37231]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:00:21 localhost python3[37280]: ansible-ansible.legacy.stat Invoked with path=/etc/ssh/sshd_config follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:21 localhost python3[37325]: ansible-ansible.legacy.copy Invoked with dest=/etc/ssh/sshd_config src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748820.992572-101040-234126448572248/source validate=/usr/sbin/sshd -T -f %s mode=None follow=False _original_basename=sshd_config_block.j2 checksum=92fbff64c26224c12f8a576f9ce1a758767bd467 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:22 localhost python3[37356]: ansible-systemd Invoked with name=sshd state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 03:00:22 localhost systemd[1]: Stopping OpenSSH server daemon... Dec 3 03:00:22 localhost systemd[1]: sshd.service: Deactivated successfully. Dec 3 03:00:22 localhost systemd[1]: Stopped OpenSSH server daemon. Dec 3 03:00:22 localhost systemd[1]: sshd.service: Consumed 4.159s CPU time, read 568.0K from disk, written 212.0K to disk. Dec 3 03:00:22 localhost systemd[1]: Stopped target sshd-keygen.target. Dec 3 03:00:22 localhost systemd[1]: Stopping sshd-keygen.target... Dec 3 03:00:22 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:00:22 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:00:22 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:00:22 localhost systemd[1]: Reached target sshd-keygen.target. Dec 3 03:00:22 localhost systemd[1]: Starting OpenSSH server daemon... Dec 3 03:00:22 localhost sshd[37360]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:00:22 localhost systemd[1]: Started OpenSSH server daemon. Dec 3 03:00:22 localhost python3[37376]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:23 localhost python3[37392]: ansible-file Invoked with path=/var/log/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:23 localhost python3[37408]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:23 localhost python3[37424]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:24 localhost python3[37440]: ansible-file Invoked with path=/var/cache/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:24 localhost python3[37456]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:25 localhost python3[37472]: ansible-file Invoked with path=/srv/node/d1 state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:25 localhost python3[37488]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:26 localhost python3[37506]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:27 localhost python3[37524]: ansible-ansible.legacy.dnf Invoked with name=['chrony'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 03:00:29 localhost sshd[37526]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:00:29 localhost sshd[37528]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:00:32 localhost python3[37577]: ansible-ansible.legacy.stat Invoked with path=/etc/chrony.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:33 localhost python3[37622]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748832.3523498-101473-134236999364943/source dest=/etc/chrony.conf owner=root group=root mode=420 follow=False _original_basename=chrony.conf.j2 checksum=4fd4fbbb2de00c70a54478b7feb8ef8adf6a3362 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:34 localhost python3[37652]: ansible-ansible.legacy.systemd Invoked with enabled=True name=chronyd state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 03:00:34 localhost python3[37670]: ansible-ansible.legacy.systemd Invoked with name=chronyd state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 03:00:34 localhost chronyd[766]: chronyd exiting Dec 3 03:00:34 localhost systemd[1]: Stopping NTP client/server... Dec 3 03:00:34 localhost systemd[1]: chronyd.service: Deactivated successfully. Dec 3 03:00:34 localhost systemd[1]: Stopped NTP client/server. Dec 3 03:00:34 localhost systemd[1]: chronyd.service: Consumed 121ms CPU time, read 1.9M from disk, written 4.0K to disk. Dec 3 03:00:34 localhost systemd[1]: Starting NTP client/server... Dec 3 03:00:34 localhost chronyd[37677]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Dec 3 03:00:34 localhost chronyd[37677]: Frequency -26.342 +/- 0.155 ppm read from /var/lib/chrony/drift Dec 3 03:00:34 localhost chronyd[37677]: Loaded seccomp filter (level 2) Dec 3 03:00:34 localhost systemd[1]: Started NTP client/server. Dec 3 03:00:35 localhost python3[37726]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/chrony-online.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:35 localhost python3[37769]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748834.9453433-101615-3445040341397/source dest=/etc/systemd/system/chrony-online.service _original_basename=chrony-online.service follow=False checksum=d4d85e046d61f558ac7ec8178c6d529d893e81e1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:36 localhost python3[37799]: ansible-systemd Invoked with state=started name=chrony-online.service enabled=True daemon-reload=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 03:00:36 localhost systemd[1]: Reloading. Dec 3 03:00:36 localhost systemd-rc-local-generator[37825]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:00:36 localhost systemd-sysv-generator[37830]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:00:36 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:00:36 localhost systemd[1]: Reloading. Dec 3 03:00:36 localhost systemd-sysv-generator[37866]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:00:36 localhost systemd-rc-local-generator[37863]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:00:36 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:00:36 localhost systemd[1]: Starting chronyd online sources service... Dec 3 03:00:36 localhost chronyc[37876]: 200 OK Dec 3 03:00:36 localhost systemd[1]: chrony-online.service: Deactivated successfully. Dec 3 03:00:36 localhost systemd[1]: Finished chronyd online sources service. Dec 3 03:00:37 localhost python3[37892]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:37 localhost chronyd[37677]: System clock was stepped by 0.000000 seconds Dec 3 03:00:37 localhost python3[37909]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:39 localhost chronyd[37677]: Selected source 23.133.168.246 (pool.ntp.org) Dec 3 03:00:47 localhost python3[37926]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:47 localhost chronyd[37677]: System clock was stepped by 0.000000 seconds Dec 3 03:00:48 localhost python3[37943]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:48 localhost python3[37960]: ansible-timezone Invoked with name=UTC hwclock=None Dec 3 03:00:48 localhost systemd[1]: Starting Time & Date Service... Dec 3 03:00:48 localhost systemd[1]: Started Time & Date Service. Dec 3 03:00:49 localhost python3[37980]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:50 localhost python3[37997]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:50 localhost python3[38014]: ansible-slurp Invoked with src=/etc/tuned/active_profile Dec 3 03:00:51 localhost sshd[38015]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:00:51 localhost python3[38032]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 03:00:51 localhost sshd[38033]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:00:52 localhost python3[38052]: ansible-file Invoked with path=/var/log/containers state=directory setype=container_file_t selevel=s0 mode=488 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Dec 3 03:00:53 localhost python3[38068]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None setype=None attributes=None Dec 3 03:00:53 localhost python3[38084]: ansible-file Invoked with path=/var/lib/tripleo-config state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Dec 3 03:00:53 localhost python3[38100]: ansible-file Invoked with path=/var/lib/container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:54 localhost python3[38116]: ansible-file Invoked with path=/var/lib/docker-container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:54 localhost sshd[38133]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:00:54 localhost python3[38132]: ansible-community.general.sefcontext Invoked with target=/var/lib/container-config-scripts(/.*)? setype=container_file_t state=present ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 03:00:55 localhost sshd[38139]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:00:55 localhost kernel: SELinux: Converting 2723 SID table entries... Dec 3 03:00:55 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 03:00:55 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 03:00:55 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 03:00:55 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 03:00:55 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 03:00:55 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 03:00:55 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 03:00:55 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=15 res=1 Dec 3 03:00:55 localhost python3[38156]: ansible-file Invoked with path=/var/lib/container-config-scripts state=directory setype=container_file_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:57 localhost sshd[38278]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:00:57 localhost python3[38295]: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-config/container-startup-config config_data={'step_0':********@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, 'mysql_data_ownership': {'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, 'rabbitmq_bootstrap': {'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, 'redis_tls_proxy': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}}, 'step_2': {'cinder_api_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, 'cinder_scheduler_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, 'clustercheck': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, 'glance_init_logs': {'command': ['/bin/bash', '-c', 'chown -R glance:glance /var/log/glance'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z']}, 'heat_init_log': {'command': ['/bin/bash', '-c', 'chown -R heat:heat /var/log/heat'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/heat:/var/log/heat:z']}, 'horizon_fix_perms': {'command': ['/bin/bash', '-c', 'touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard']}, 'keystone_init_log': {'command': ['/bin/bash', '-c', 'chown -R keystone:keystone /var/log/keystone'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z']}, 'manila_init_logs': {'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, 'mysql_wait_bundle': {'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/ Dec 3 03:00:58 localhost rsyslogd[759]: message too long (84240) with configured size 8096, begin of message is: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-c [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Dec 3 03:00:58 localhost python3[38311]: ansible-file Invoked with path=/var/lib/kolla/config_files state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Dec 3 03:00:58 localhost sshd[38328]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:00:58 localhost python3[38327]: ansible-file Invoked with path=/var/lib/config-data mode=493 state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Dec 3 03:00:59 localhost python3[38345]: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/config_files/ceilometer_agent_central.json': {'command': '/usr/bin/ceilometer-polling --polling-namespaces central --logfile /var/log/ceilometer/central.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_gnocchi_upgrade.json': {'command': "/usr/bin/bootstrap_host_exec ceilometer_agent_central su ceilometer -s /bin/bash -c 'for n in {1..10}; do /usr/bin/ceilometer-upgrade && exit 0 || sleep 30; done; exit 1'", 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_notification.json': {'command': '/usr/bin/ceilometer-agent-notification --logfile /var/log/ceilometer/agent-notification.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/cinder_api.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}]}, '/var/lib/kolla/config_files/cinder_api_db_sync.json': {'command': "/usr/bin/bootstrap_host_exec cinder_api su cinder -s /bin/bash -c 'cinder-manage db sync --bump-versions'", 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_backup.json': {'command': '/usr/bin/cinder-backup --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_scheduler.json': {'command': '/usr/bin/cinder-scheduler --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_volume.json': {'command': '/usr/bin/cinder-volume --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/clustercheck.json': {'command': 'bash -c $* -- eval source /etc/sysconfig/clustercheck; exec socat -T"${TRIPLEO_HEALTHCHECK_TIMEOUT:-2}" "$TRIPLEO_SOCAT_BIND" system:"grep -qPe \\"^\\\\r\\$\\" && /usr/bin/clustercheck"', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/collectd.json': {'command': '/usr/sbin/collectd -f', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/collectd.d'}], 'permissions': [{'owner': 'collectd:collectd', 'path': '/var/log/collectd', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/scripts', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/config-scripts', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api.json': {'command': '/usr/bin/glance-api --config-file /usr/share/glance/glance-api-dist.conf --config-file /etc/glance/glance-api.conf --config-file /etc/glance/glance-image-import.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/lib/glance', 'recurse': True}, {'owner': 'glance:glance', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}]}, '/var/lib/kolla/config_files/glance_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/log/glance', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api_tls_proxy.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modul Dec 3 03:00:59 localhost rsyslogd[759]: message too long (37323) with configured size 8096, begin of message is: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/conf [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Dec 3 03:01:07 localhost python3[38372]: ansible-stat Invoked with path=/etc/ipa/default.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 03:01:10 localhost sshd[38389]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:01:11 localhost python3[38388]: ansible-ipaclient_test Invoked with domain=ooo.test servers=['ipa.ooo.test'] hostname=np0005543226.ooo.test no_ntp=False force_ntpd=False no_nisdomain=False kinit_attempts=5 configure_firefox=False all_ip_addresses=False on_master=False enable_dns_updates=False realm=None ntp_servers=None ntp_pool=None nisdomain=None ca_cert_files=None firefox_dir=None ip_addresses=None Dec 3 03:01:11 localhost sshd[38397]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:01:11 localhost python3[38414]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:12 localhost python3[38430]: ansible-ipaclient_setup_ntp Invoked with ntp_servers=[''] ntp_pool= no_ntp=False on_master=False servers=['ipa.ooo.test'] domain=ooo.test Dec 3 03:01:12 localhost systemd[1]: Reloading. Dec 3 03:01:12 localhost systemd-sysv-generator[38468]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:01:12 localhost systemd-rc-local-generator[38464]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:01:12 localhost sshd[38473]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:01:12 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:01:12 localhost systemd[1]: Stopping NTP client/server... Dec 3 03:01:12 localhost chronyd[37677]: chronyd exiting Dec 3 03:01:12 localhost systemd[1]: chronyd.service: Deactivated successfully. Dec 3 03:01:12 localhost systemd[1]: Stopped NTP client/server. Dec 3 03:01:12 localhost systemd[1]: Starting NTP client/server... Dec 3 03:01:12 localhost chronyd[38482]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Dec 3 03:01:12 localhost chronyd[38482]: Frequency -26.342 +/- 0.182 ppm read from /var/lib/chrony/drift Dec 3 03:01:12 localhost chronyd[38482]: Loaded seccomp filter (level 2) Dec 3 03:01:12 localhost systemd[1]: Started NTP client/server. Dec 3 03:01:17 localhost sshd[38486]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:01:17 localhost chronyd[38482]: Selected source 23.133.168.247 (pool.ntp.org) Dec 3 03:01:18 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Dec 3 03:01:19 localhost python3[38505]: ansible-ipaclient_test_keytab Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005543226.ooo.test kdc=ipa.ooo.test kinit_attempts=5 Dec 3 03:01:21 localhost python3[38526]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r "OOO.TEST"#012 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:01:22 localhost python3[38543]: ansible-ipaclient_set_hostname Invoked with hostname=np0005543226.ooo.test Dec 3 03:01:22 localhost systemd[1]: Starting Hostname Service... Dec 3 03:01:22 localhost systemd[1]: Started Hostname Service. Dec 3 03:01:23 localhost python3[38562]: ansible-ipaclient_temp_krb5 Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005543226.ooo.test kdc=ipa.ooo.test on_master=False Dec 3 03:01:23 localhost python3[38583]: ansible-ipaclient_join Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005543226.ooo.test force_join=False password=NOT_LOGGING_PARAMETER kinit_attempts=5 krb_name=/tmp/tmp_g7bp0by principal=None keytab=None admin_keytab=None ca_cert_file=None debug=None Dec 3 03:01:24 localhost python3[38583]: ansible-ipaclient_join Enrolled in IPA realm OOO.TEST Dec 3 03:01:25 localhost python3[38604]: ansible-ipaclient_ipa_conf Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005543226.ooo.test basedn=dc=ooo,dc=test Dec 3 03:01:26 localhost python3[38621]: ansible-ipaclient_setup_sssd Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005543226.ooo.test on_master=False no_ssh=False no_sshd=False no_sudo=False all_ip_addresses=False fixed_primary=False permit=False enable_dns_updates=False preserve_sssd=False no_krb5_offline_passwords=False Dec 3 03:01:26 localhost systemd-journald[617]: Field hash table of /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal has a fill level at 76.3 (254 of 333 items), suggesting rotation. Dec 3 03:01:26 localhost systemd-journald[617]: /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal: Journal header limits reached or header out-of-date, rotating. Dec 3 03:01:26 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 03:01:26 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 03:01:26 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 03:01:27 localhost python3[38639]: ansible-ipaclient_api Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST hostname=np0005543226.ooo.test krb_name=/tmp/tmp_g7bp0by debug=False Dec 3 03:01:29 localhost python3[38668]: ansible-ipaclient_setup_nss Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005543226.ooo.test subject_base=O=OOO.TEST principal=admin mkhomedir=False ca_enabled=True on_master=False dnsok=False enable_dns_updates=False all_ip_addresses=False request_cert=False preserve_sssd=False no_ssh=False no_sshd=False no_sudo=False fixed_primary=False permit=False no_krb5_offline_passwords=False no_dns_sshfp=False nosssd_files={} krb_name=/tmp/tmp_g7bp0by ip_addresses=None Dec 3 03:01:33 localhost systemd[1]: Starting System Security Services Daemon... Dec 3 03:01:33 localhost sssd[38703]: Starting up Dec 3 03:01:33 localhost sssd_be[38704]: Starting up Dec 3 03:01:33 localhost sssd_pam[38706]: Starting up Dec 3 03:01:33 localhost sssd_ssh[38707]: Starting up Dec 3 03:01:33 localhost sssd_nss[38705]: Starting up Dec 3 03:01:33 localhost sssd_sudo[38708]: Starting up Dec 3 03:01:33 localhost sssd_pac[38709]: Starting up Dec 3 03:01:33 localhost systemd[1]: Started System Security Services Daemon. Dec 3 03:01:33 localhost systemd[1]: Reloading. Dec 3 03:01:33 localhost systemd-rc-local-generator[38732]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:01:33 localhost systemd-sysv-generator[38737]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:01:33 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:01:34 localhost python3[38763]: ansible-ipaclient_setup_ssh Invoked with servers=['ipa.ooo.test'] sssd=True no_ssh=False ssh_trust_dns=False no_sshd=False Dec 3 03:01:35 localhost systemd[1]: Stopping OpenSSH server daemon... Dec 3 03:01:35 localhost systemd[1]: sshd.service: Deactivated successfully. Dec 3 03:01:35 localhost systemd[1]: sshd.service: Unit process 38133 (sshd) remains running after unit stopped. Dec 3 03:01:35 localhost systemd[1]: Stopped OpenSSH server daemon. Dec 3 03:01:35 localhost systemd[1]: Stopped target sshd-keygen.target. Dec 3 03:01:35 localhost systemd[1]: Stopping sshd-keygen.target... Dec 3 03:01:35 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:01:35 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:01:35 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:01:35 localhost systemd[1]: Reached target sshd-keygen.target. Dec 3 03:01:35 localhost systemd[1]: Starting OpenSSH server daemon... Dec 3 03:01:35 localhost sshd[38768]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:01:35 localhost systemd[1]: Started OpenSSH server daemon. Dec 3 03:01:35 localhost python3[38785]: ansible-ipaclient_setup_automount Invoked with servers=['ipa.ooo.test'] sssd=True automount_location=None Dec 3 03:01:36 localhost python3[38802]: ansible-ipaclient_setup_nis Invoked with domain=ooo.test nisdomain=None Dec 3 03:01:36 localhost systemd[1]: Reloading. Dec 3 03:01:36 localhost systemd-sysv-generator[38835]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:01:36 localhost systemd-rc-local-generator[38830]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:01:36 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:01:36 localhost systemd[1]: nis-domainname.service: Deactivated successfully. Dec 3 03:01:36 localhost systemd[1]: Stopped Read and set NIS domainname from /etc/sysconfig/network. Dec 3 03:01:36 localhost systemd[1]: Stopping Read and set NIS domainname from /etc/sysconfig/network... Dec 3 03:01:36 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Dec 3 03:01:36 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Dec 3 03:01:37 localhost python3[38861]: ansible-ansible.builtin.file Invoked with path=/tmp/tmp_g7bp0by state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:38 localhost python3[38877]: ansible-ipaclient_setup_krb5 Invoked with realm=OOO.TEST domain=ooo.test servers=['ipa.ooo.test'] kdc=ipa.ooo.test dnsok=False client_domain=ooo.test hostname=np0005543226.ooo.test sssd=True force=True Dec 3 03:01:38 localhost python3[38898]: ansible-ipaclient_setup_certmonger Invoked with realm=OOO.TEST hostname=np0005543226.ooo.test subject_base=O=OOO.TEST ca_enabled=True request_cert=False Dec 3 03:01:39 localhost python3[38917]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:39 localhost python3[38933]: ansible-ansible.builtin.file Invoked with path=/tmp/tmp_g7bp0by state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:40 localhost python3[38949]: ansible-ansible.builtin.file Invoked with path=/tmp/tmp_g7bp0by.ipabkp state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:40 localhost python3[38965]: ansible-systemd Invoked with daemon_reload=True name=certmonger.service state=restarted daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 03:01:40 localhost systemd[1]: Reloading. Dec 3 03:01:40 localhost systemd-sysv-generator[38993]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:01:40 localhost systemd-rc-local-generator[38989]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:01:40 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:01:41 localhost systemd[1]: Starting Certificate monitoring and PKI enrollment... Dec 3 03:01:41 localhost certmonger[39004]: 2025-12-03 08:01:41 [39004] Changing to root directory. Dec 3 03:01:41 localhost certmonger[39004]: 2025-12-03 08:01:41 [39004] Obtaining system lock. Dec 3 03:01:41 localhost systemd[1]: Started Certificate monitoring and PKI enrollment. Dec 3 03:01:41 localhost certmonger[39005]: 2025-12-03 08:01:41 [39005] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:41 localhost certmonger[39006]: 2025-12-03 08:01:41 [39006] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:41 localhost certmonger[39007]: 2025-12-03 08:01:41 [39007] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:41 localhost certmonger[39008]: 2025-12-03 08:01:41 [39008] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:41 localhost certmonger[39009]: 2025-12-03 08:01:41 [39009] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:41 localhost certmonger[39010]: 2025-12-03 08:01:41 [39010] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:41 localhost certmonger[39011]: 2025-12-03 08:01:41 [39011] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:41 localhost certmonger[39012]: 2025-12-03 08:01:41 [39012] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:41 localhost certmonger[39013]: 2025-12-03 08:01:41 [39013] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:41 localhost certmonger[39014]: 2025-12-03 08:01:41 [39014] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:41 localhost certmonger[39015]: 2025-12-03 08:01:41 [39015] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:41 localhost certmonger[39016]: 2025-12-03 08:01:41 [39016] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:41 localhost certmonger[39017]: 2025-12-03 08:01:41 [39017] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:41 localhost certmonger[39018]: 2025-12-03 08:01:41 [39018] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:41 localhost certmonger[39019]: 2025-12-03 08:01:41 [39019] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:41 localhost certmonger[39020]: 2025-12-03 08:01:41 [39020] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:41 localhost certmonger[39021]: 2025-12-03 08:01:41 [39021] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:41 localhost certmonger[39022]: 2025-12-03 08:01:41 [39022] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:41 localhost certmonger[39023]: 2025-12-03 08:01:41 [39023] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:41 localhost certmonger[39024]: 2025-12-03 08:01:41 [39024] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:41 localhost certmonger[39025]: 2025-12-03 08:01:41 [39025] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:41 localhost certmonger[39026]: 2025-12-03 08:01:41 [39026] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:41 localhost certmonger[39027]: 2025-12-03 08:01:41 [39027] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:41 localhost certmonger[39028]: 2025-12-03 08:01:41 [39028] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:41 localhost certmonger[39004]: 2025-12-03 08:01:41 [39004] No hooks set for ca-pre-save command. Dec 3 03:01:41 localhost certmonger[39004]: 2025-12-03 08:01:41 [39004] No hooks set for ca-post-save command. Dec 3 03:01:41 localhost certmonger[39031]: 2025-12-03 08:01:41 [39031] Certificate "Local Signing Authority" valid for 31535999s. Dec 3 03:01:41 localhost certmonger[39004]: 2025-12-03 08:01:41 [39004] No hooks set for ca-pre-save command. Dec 3 03:01:41 localhost certmonger[39004]: 2025-12-03 08:01:41 [39004] No hooks set for ca-post-save command. Dec 3 03:01:41 localhost certmonger[39034]: 2025-12-03 08:01:41 [39034] Certificate "OOO.TEST IPA CA" valid for 631151018s. Dec 3 03:01:50 localhost python3[39082]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/config_step.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:01:50 localhost python3[39125]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/config_step.json force=True mode=0600 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748909.757903-104934-67468737078095/source _original_basename=tmpezvkpizl follow=False checksum=dfdcc7695edd230e7a2c06fc7b739bfa56506d8f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:50 localhost python3[39157]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_1 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 03:01:52 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 3 03:01:53 localhost python3[39282]: ansible-file Invoked with path=/var/lib/container-puppet state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Dec 3 03:01:55 localhost python3[39403]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Dec 3 03:01:56 localhost python3[39419]: ansible-file Invoked with path=/etc/pki/tls/certs/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Dec 3 03:01:57 localhost python3[39435]: ansible-file Invoked with path=/etc/pki/tls/private/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Dec 3 03:01:57 localhost python3[39451]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 03:01:58 localhost python3[39471]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 03:02:00 localhost sshd[39473]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:02:00 localhost sshd[39475]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:02:02 localhost python3[39492]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 03:02:04 localhost sshd[39494]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:02:05 localhost python3[39511]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:02:05 localhost python3[39528]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:02:06 localhost python3[39544]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 03:02:06 localhost systemd[1]: Reloading. Dec 3 03:02:06 localhost systemd-rc-local-generator[39569]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:02:06 localhost systemd-sysv-generator[39574]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:02:06 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:02:07 localhost python3[39598]: ansible-certificate_request Invoked with name=httpd-ctlplane dns=['np0005543226.ctlplane.ooo.test'] principal=['HTTP/np0005543226.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-ctlplane.crt /etc/pki/tls/certs/httpd/httpd-ctlplane.crt#012cp /etc/pki/tls/private/httpd-ctlplane.key /etc/pki/tls/private/httpd/httpd-ctlplane.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39608]: 2025-12-03 08:02:07 [39608] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543226.ctlplane.ooo.test" for child. Dec 3 03:02:07 localhost certmonger[39608]: 2025-12-03 08:02:07 [39608] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543226.ctlplane.ooo.test Dec 3 03:02:07 localhost certmonger[39608]: " for child. Dec 3 03:02:07 localhost certmonger[39608]: 2025-12-03 08:02:07 [39608] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005543226.ctlplane.ooo.test@OOO.TEST Dec 3 03:02:07 localhost certmonger[39608]: " for child. Dec 3 03:02:07 localhost certmonger[39608]: 2025-12-03 08:02:07 [39608] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 03:02:07 localhost certmonger[39608]: 2025-12-03 08:02:07 [39608] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 03:02:07 localhost certmonger[39608]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NTQzMjI2LmN0bHBsYW5lLm9v Dec 3 03:02:07 localhost certmonger[39608]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAns8iUimWM0LG Dec 3 03:02:07 localhost certmonger[39608]: 6Aq3tqDAdenUygn7d6PCNPpBj9kfMhkxsQRCnYvBGp2PZrjsjc6bGvwU6P4m3Rbp Dec 3 03:02:07 localhost certmonger[39608]: DOVIxDbtvBrdvrgvLdDawPnkE7NZH5Gs5coU3/cEorXgbDbSRji2jpGZOkg3WGDN Dec 3 03:02:07 localhost certmonger[39608]: 1HLVBmcVcruhVMmZEaY7Sb5Q0uiZw1BYzsKeZUdbagpzPQwJdXDaY2+FYKPKc+5w Dec 3 03:02:07 localhost certmonger[39608]: IX6Lrxrwx2w6ObtjsE2NjuTOGTuPzFRnFgGWvWQGjcgTf+hbgTkTOHN0GP2XI97l Dec 3 03:02:07 localhost certmonger[39608]: Ixv/fmtCi0dvKzw0/+Lt/WLqbmLzH5mxk9scNUC8q44zUj0z132dXWz+o5Z7WlmU Dec 3 03:02:07 localhost certmonger[39608]: iHUPcz45WwIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAyADAA Dec 3 03:02:07 localhost certmonger[39608]: MwAwADgAMAAyADAANzCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Dec 3 03:02:07 localhost certmonger[39608]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1NDMyMjYuY3RscGxhbmUub29vLnRlc3Sg Dec 3 03:02:07 localhost certmonger[39608]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU0MzIyNi5jdGxwbGFuZS5vb28u Dec 3 03:02:07 localhost certmonger[39608]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Dec 3 03:02:07 localhost certmonger[39608]: oSgwJhsESFRUUBsebnAwMDA1NTQzMjI2LmN0bHBsYW5lLm9vby50ZXN0MB0GA1Ud Dec 3 03:02:07 localhost certmonger[39608]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Dec 3 03:02:07 localhost certmonger[39608]: BBT4M9dCqhOQe0VJ0D3Ip55E8lL73TANBgkqhkiG9w0BAQsFAAOCAQEAi98GRGT+ Dec 3 03:02:07 localhost certmonger[39608]: rNUovzgN0+HaDUOg/ORGOBU9EvMr+sYPX1bWWyEZiyVubgj0/AvZWHRIB9UjwUr+ Dec 3 03:02:07 localhost certmonger[39608]: rsYIbsJv/N8c7tX2kjWFPWdB/DuAXG/AO0UJz53OBB4MmLOG+RpR+iOBogXd1SU8 Dec 3 03:02:07 localhost certmonger[39608]: QMrZ7JTZZX9pBZbnsW9FRKEvohXnHOvkOV60V+Wt20apvV+QgyBFBjmvmhGMi5vp Dec 3 03:02:07 localhost certmonger[39608]: 62H6cSob0C/sgMolN9uL0VrfNG2JRi+xOOGxglcS5m9TwM5X9BfjtiC4mmvBFu0N Dec 3 03:02:07 localhost certmonger[39608]: eMK5Ad4wTTyr7dUc49v4qXNpFct41li0HuiA7X5ECsFarvUeZk5r7QWYdprA9+YN Dec 3 03:02:07 localhost certmonger[39608]: nhzw76qEJI7PFA== Dec 3 03:02:07 localhost certmonger[39608]: -----END CERTIFICATE REQUEST----- Dec 3 03:02:07 localhost certmonger[39608]: " for child. Dec 3 03:02:07 localhost certmonger[39608]: 2025-12-03 08:02:07 [39608] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 03:02:07 localhost certmonger[39608]: 2025-12-03 08:02:07 [39608] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAns8iUimWM0LG6Aq3tqDAdenUygn7d6PCNPpBj9kfMhkxsQRCnYvBGp2PZrjsjc6bGvwU6P4m3RbpDOVIxDbtvBrdvrgvLdDawPnkE7NZH5Gs5coU3/cEorXgbDbSRji2jpGZOkg3WGDN1HLVBmcVcruhVMmZEaY7Sb5Q0uiZw1BYzsKeZUdbagpzPQwJdXDaY2+FYKPKc+5wIX6Lrxrwx2w6ObtjsE2NjuTOGTuPzFRnFgGWvWQGjcgTf+hbgTkTOHN0GP2XI97lIxv/fmtCi0dvKzw0/+Lt/WLqbmLzH5mxk9scNUC8q44zUj0z132dXWz+o5Z7WlmUiHUPcz45WwIDAQAB" for child. Dec 3 03:02:07 localhost certmonger[39608]: 2025-12-03 08:02:07 [39608] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 03:02:07 localhost certmonger[39608]: 2025-12-03 08:02:07 [39608] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 03:02:07 localhost certmonger[39608]: 2025-12-03 08:02:07 [39608] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 03:02:07 localhost certmonger[39608]: 2025-12-03 08:02:07 [39608] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:07 localhost certmonger[39608]: 2025-12-03 08:02:07 [39608] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39608]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 03:02:07 localhost certmonger[39608]: Certificate: "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" Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Certificate submission still ongoing. Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Certificate submission attempt complete. Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Child status = 0. Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Child output: Dec 3 03:02:07 localhost certmonger[39004]: "-----BEGIN CERTIFICATE----- Dec 3 03:02:07 localhost certmonger[39004]: MIIFSTCCA7GgAwIBAgIBDDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:07 localhost certmonger[39004]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:07 localhost certmonger[39004]: MDIwN1oXDTI3MTIwNDA4MDIwN1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:07 localhost certmonger[39004]: BAMMHm5wMDAwNTU0MzIyNi5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:07 localhost certmonger[39004]: AQEBBQADggEPADCCAQoCggEBAJ7PIlIpljNCxugKt7agwHXp1MoJ+3ejwjT6QY/Z Dec 3 03:02:07 localhost certmonger[39004]: HzIZMbEEQp2LwRqdj2a47I3Omxr8FOj+Jt0W6QzlSMQ27bwa3b64Ly3Q2sD55BOz Dec 3 03:02:07 localhost certmonger[39004]: WR+RrOXKFN/3BKK14Gw20kY4to6RmTpIN1hgzdRy1QZnFXK7oVTJmRGmO0m+UNLo Dec 3 03:02:07 localhost certmonger[39004]: mcNQWM7CnmVHW2oKcz0MCXVw2mNvhWCjynPucCF+i68a8MdsOjm7Y7BNjY7kzhk7 Dec 3 03:02:07 localhost certmonger[39004]: j8xUZxYBlr1kBo3IE3/oW4E5EzhzdBj9lyPe5SMb/35rQotHbys8NP/i7f1i6m5i Dec 3 03:02:07 localhost certmonger[39004]: 8x+ZsZPbHDVAvKuOM1I9M9d9nV1s/qOWe1pZlIh1D3M+OVsCAwEAAaOCAd0wggHZ Dec 3 03:02:07 localhost certmonger[39004]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:07 localhost certmonger[39004]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:07 localhost certmonger[39004]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:07 localhost certmonger[39004]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:07 localhost certmonger[39004]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:07 localhost certmonger[39004]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCk8a0Y4+Y/40kmvUvytYd794ddU Dec 3 03:02:07 localhost certmonger[39004]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNi5jdGxwbGFuZS5vb28udGVzdKA8 Dec 3 03:02:07 localhost certmonger[39004]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI2LmN0bHBsYW5lLm9vby50 Dec 3 03:02:07 localhost certmonger[39004]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:07 localhost certmonger[39004]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjYuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Dec 3 03:02:07 localhost certmonger[39004]: hvcNAQELBQADggGBAE08i14/P0blb+DwPI2qK6/wkJ1PNbzUGAcOJwn08KT6tmzB Dec 3 03:02:07 localhost certmonger[39004]: 0PkD9AO+yH1XJm41fgQoplHI/bl4nb4vBwQASkyEZRQdWsQQ0dmCOdE3HQ7w+VOQ Dec 3 03:02:07 localhost certmonger[39004]: 9RDDiX1NQjThIfKjI2Kw9AVmEeSYpaxPgDie5udbJv6zaxmGiOCxFfC8llvzoO9F Dec 3 03:02:07 localhost certmonger[39004]: nbLwAIh+ALtDfZyQVGhCfccMqrwdJ4sv9y5ROfYWR7eOYzgU/h+I6l5GrpBDdoyq Dec 3 03:02:07 localhost certmonger[39004]: PlXjZDrHOqBhuTzd+HZKX4AughSvxe2H+8u6nXC8DlJuLKimM/4YTv2i/awhiU2u Dec 3 03:02:07 localhost certmonger[39004]: IOCoHZbGt0JjqQNVSDLPDEavSNx0s1prt+xDnBfoUpMmiKS6+dYdkEkhcQZ/MKyI Dec 3 03:02:07 localhost certmonger[39004]: 0CmUStD0bA6AiYNzxiE3X70qdH4UC1LdbPh30ixn+CgSfq8ZUd1vut7YrrLCNVt2 Dec 3 03:02:07 localhost certmonger[39004]: OB5Dt65R4kHTgnR/kRAZtyp0Rn8BDt3CB8Q0YIWN5FkbYEQTaFmx/CYix1n6K5oI Dec 3 03:02:07 localhost certmonger[39004]: 1pP6MvrLBpOXmcgQ4g== Dec 3 03:02:07 localhost certmonger[39004]: -----END CERTIFICATE----- Dec 3 03:02:07 localhost certmonger[39004]: " Dec 3 03:02:07 localhost certmonger[39610]: 2025-12-03 08:02:07 [39610] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 03:02:07 localhost certmonger[39610]: MIIFSTCCA7GgAwIBAgIBDDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:07 localhost certmonger[39610]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:07 localhost certmonger[39610]: MDIwN1oXDTI3MTIwNDA4MDIwN1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:07 localhost certmonger[39610]: BAMMHm5wMDAwNTU0MzIyNi5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:07 localhost certmonger[39610]: AQEBBQADggEPADCCAQoCggEBAJ7PIlIpljNCxugKt7agwHXp1MoJ+3ejwjT6QY/Z Dec 3 03:02:07 localhost certmonger[39610]: HzIZMbEEQp2LwRqdj2a47I3Omxr8FOj+Jt0W6QzlSMQ27bwa3b64Ly3Q2sD55BOz Dec 3 03:02:07 localhost certmonger[39610]: WR+RrOXKFN/3BKK14Gw20kY4to6RmTpIN1hgzdRy1QZnFXK7oVTJmRGmO0m+UNLo Dec 3 03:02:07 localhost certmonger[39610]: mcNQWM7CnmVHW2oKcz0MCXVw2mNvhWCjynPucCF+i68a8MdsOjm7Y7BNjY7kzhk7 Dec 3 03:02:07 localhost certmonger[39610]: j8xUZxYBlr1kBo3IE3/oW4E5EzhzdBj9lyPe5SMb/35rQotHbys8NP/i7f1i6m5i Dec 3 03:02:07 localhost certmonger[39610]: 8x+ZsZPbHDVAvKuOM1I9M9d9nV1s/qOWe1pZlIh1D3M+OVsCAwEAAaOCAd0wggHZ Dec 3 03:02:07 localhost certmonger[39610]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:07 localhost certmonger[39610]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:07 localhost certmonger[39610]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:07 localhost certmonger[39610]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:07 localhost certmonger[39610]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:07 localhost certmonger[39610]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCk8a0Y4+Y/40kmvUvytYd794ddU Dec 3 03:02:07 localhost certmonger[39610]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNi5jdGxwbGFuZS5vb28udGVzdKA8 Dec 3 03:02:07 localhost certmonger[39610]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI2LmN0bHBsYW5lLm9vby50 Dec 3 03:02:07 localhost certmonger[39610]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:07 localhost certmonger[39610]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjYuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Dec 3 03:02:07 localhost certmonger[39610]: hvcNAQELBQADggGBAE08i14/P0blb+DwPI2qK6/wkJ1PNbzUGAcOJwn08KT6tmzB Dec 3 03:02:07 localhost certmonger[39610]: 0PkD9AO+yH1XJm41fgQoplHI/bl4nb4vBwQASkyEZRQdWsQQ0dmCOdE3HQ7w+VOQ Dec 3 03:02:07 localhost certmonger[39610]: 9RDDiX1NQjThIfKjI2Kw9AVmEeSYpaxPgDie5udbJv6zaxmGiOCxFfC8llvzoO9F Dec 3 03:02:07 localhost certmonger[39610]: nbLwAIh+ALtDfZyQVGhCfccMqrwdJ4sv9y5ROfYWR7eOYzgU/h+I6l5GrpBDdoyq Dec 3 03:02:07 localhost certmonger[39610]: PlXjZDrHOqBhuTzd+HZKX4AughSvxe2H+8u6nXC8DlJuLKimM/4YTv2i/awhiU2u Dec 3 03:02:07 localhost certmonger[39610]: IOCoHZbGt0JjqQNVSDLPDEavSNx0s1prt+xDnBfoUpMmiKS6+dYdkEkhcQZ/MKyI Dec 3 03:02:07 localhost certmonger[39610]: 0CmUStD0bA6AiYNzxiE3X70qdH4UC1LdbPh30ixn+CgSfq8ZUd1vut7YrrLCNVt2 Dec 3 03:02:07 localhost certmonger[39610]: OB5Dt65R4kHTgnR/kRAZtyp0Rn8BDt3CB8Q0YIWN5FkbYEQTaFmx/CYix1n6K5oI Dec 3 03:02:07 localhost certmonger[39610]: 1pP6MvrLBpOXmcgQ4g== Dec 3 03:02:07 localhost certmonger[39610]: -----END CERTIFICATE----- Dec 3 03:02:07 localhost certmonger[39610]: ". Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Certificate submission still ongoing. Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Certificate submission postprocessing complete. Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Child status = 0. Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Child output: Dec 3 03:02:07 localhost certmonger[39004]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n1pP6MvrLBpOXmcgQ4g==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 03:02:07 localhost certmonger[39004]: " Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 03:02:07 localhost certmonger[39004]: MIIFSTCCA7GgAwIBAgIBDDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:07 localhost certmonger[39004]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:07 localhost certmonger[39004]: MDIwN1oXDTI3MTIwNDA4MDIwN1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:07 localhost certmonger[39004]: BAMMHm5wMDAwNTU0MzIyNi5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:07 localhost certmonger[39004]: AQEBBQADggEPADCCAQoCggEBAJ7PIlIpljNCxugKt7agwHXp1MoJ+3ejwjT6QY/Z Dec 3 03:02:07 localhost certmonger[39004]: HzIZMbEEQp2LwRqdj2a47I3Omxr8FOj+Jt0W6QzlSMQ27bwa3b64Ly3Q2sD55BOz Dec 3 03:02:07 localhost certmonger[39004]: WR+RrOXKFN/3BKK14Gw20kY4to6RmTpIN1hgzdRy1QZnFXK7oVTJmRGmO0m+UNLo Dec 3 03:02:07 localhost certmonger[39004]: mcNQWM7CnmVHW2oKcz0MCXVw2mNvhWCjynPucCF+i68a8MdsOjm7Y7BNjY7kzhk7 Dec 3 03:02:07 localhost certmonger[39004]: j8xUZxYBlr1kBo3IE3/oW4E5EzhzdBj9lyPe5SMb/35rQotHbys8NP/i7f1i6m5i Dec 3 03:02:07 localhost certmonger[39004]: 8x+ZsZPbHDVAvKuOM1I9M9d9nV1s/qOWe1pZlIh1D3M+OVsCAwEAAaOCAd0wggHZ Dec 3 03:02:07 localhost certmonger[39004]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:07 localhost certmonger[39004]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:07 localhost certmonger[39004]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:07 localhost certmonger[39004]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:07 localhost certmonger[39004]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:07 localhost certmonger[39004]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCk8a0Y4+Y/40kmvUvytYd794ddU Dec 3 03:02:07 localhost certmonger[39004]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNi5jdGxwbGFuZS5vb28udGVzdKA8 Dec 3 03:02:07 localhost certmonger[39004]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI2LmN0bHBsYW5lLm9vby50 Dec 3 03:02:07 localhost certmonger[39004]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:07 localhost certmonger[39004]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjYuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Dec 3 03:02:07 localhost certmonger[39004]: hvcNAQELBQADggGBAE08i14/P0blb+DwPI2qK6/wkJ1PNbzUGAcOJwn08KT6tmzB Dec 3 03:02:07 localhost certmonger[39004]: 0PkD9AO+yH1XJm41fgQoplHI/bl4nb4vBwQASkyEZRQdWsQQ0dmCOdE3HQ7w+VOQ Dec 3 03:02:07 localhost certmonger[39004]: 9RDDiX1NQjThIfKjI2Kw9AVmEeSYpaxPgDie5udbJv6zaxmGiOCxFfC8llvzoO9F Dec 3 03:02:07 localhost certmonger[39004]: nbLwAIh+ALtDfZyQVGhCfccMqrwdJ4sv9y5ROfYWR7eOYzgU/h+I6l5GrpBDdoyq Dec 3 03:02:07 localhost certmonger[39004]: PlXjZDrHOqBhuTzd+HZKX4AughSvxe2H+8u6nXC8DlJuLKimM/4YTv2i/awhiU2u Dec 3 03:02:07 localhost certmonger[39004]: IOCoHZbGt0JjqQNVSDLPDEavSNx0s1prt+xDnBfoUpMmiKS6+dYdkEkhcQZ/MKyI Dec 3 03:02:07 localhost certmonger[39004]: 0CmUStD0bA6AiYNzxiE3X70qdH4UC1LdbPh30ixn+CgSfq8ZUd1vut7YrrLCNVt2 Dec 3 03:02:07 localhost certmonger[39004]: OB5Dt65R4kHTgnR/kRAZtyp0Rn8BDt3CB8Q0YIWN5FkbYEQTaFmx/CYix1n6K5oI Dec 3 03:02:07 localhost certmonger[39004]: 1pP6MvrLBpOXmcgQ4g== Dec 3 03:02:07 localhost certmonger[39004]: -----END CERTIFICATE----- Dec 3 03:02:07 localhost certmonger[39004]: ". Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Certificate issued (0 chain certificates, 0 roots). Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] No hooks set for pre-save command. Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39618]: Certificate in file "/etc/pki/tls/certs/httpd-ctlplane.crt" issued by CA and saved. Dec 3 03:02:07 localhost certmonger[39004]: 2025-12-03 08:02:07 [39004] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:08 localhost systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 3 03:02:08 localhost systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 3 03:02:08 localhost systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Dec 3 03:02:08 localhost systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Dec 3 03:02:08 localhost python3[39637]: ansible-certificate_request Invoked with name=httpd-storage dns=['np0005543226.storage.ooo.test'] principal=['HTTP/np0005543226.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage.crt /etc/pki/tls/certs/httpd/httpd-storage.crt#012cp /etc/pki/tls/private/httpd-storage.key /etc/pki/tls/private/httpd/httpd-storage.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 03:02:08 localhost certmonger[39004]: 2025-12-03 08:02:08 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[39004]: 2025-12-03 08:02:08 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[39004]: 2025-12-03 08:02:08 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[39004]: 2025-12-03 08:02:08 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[39004]: 2025-12-03 08:02:08 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[39004]: 2025-12-03 08:02:08 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[39004]: 2025-12-03 08:02:08 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[39004]: 2025-12-03 08:02:08 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[39004]: 2025-12-03 08:02:08 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[39004]: 2025-12-03 08:02:08 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[39004]: 2025-12-03 08:02:08 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[39004]: 2025-12-03 08:02:08 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[39004]: 2025-12-03 08:02:08 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[39004]: 2025-12-03 08:02:08 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[39004]: 2025-12-03 08:02:08 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[39004]: 2025-12-03 08:02:09 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[39004]: 2025-12-03 08:02:09 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[39655]: 2025-12-03 08:02:09 [39655] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543226.storage.ooo.test" for child. Dec 3 03:02:09 localhost certmonger[39655]: 2025-12-03 08:02:09 [39655] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543226.storage.ooo.test Dec 3 03:02:09 localhost certmonger[39655]: " for child. Dec 3 03:02:09 localhost certmonger[39655]: 2025-12-03 08:02:09 [39655] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005543226.storage.ooo.test@OOO.TEST Dec 3 03:02:09 localhost certmonger[39655]: " for child. Dec 3 03:02:09 localhost certmonger[39655]: 2025-12-03 08:02:09 [39655] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 03:02:09 localhost certmonger[39655]: 2025-12-03 08:02:09 [39655] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 03:02:09 localhost certmonger[39655]: MIIDwjCCAqoCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NTQzMjI2LnN0b3JhZ2Uub29v Dec 3 03:02:09 localhost certmonger[39655]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDYxwRxv/PsV2o3 Dec 3 03:02:09 localhost certmonger[39655]: CEifybAez7xfAZ8+ImuuCCNe04vv8aFOdNdmheB3YA5+CwjKSbrosEtZC9MTCS95 Dec 3 03:02:09 localhost certmonger[39655]: ANRae9F2PS/ApODLtn9rh1tG+mpWDROoaaUbqvlDcNBbJFkhYyhgabZVnrwWWimU Dec 3 03:02:09 localhost certmonger[39655]: ndchUnSYqA9PTUGJoJHPnr0B9JP3OVh/6OP4rfrmfhfhxRVtYcyRdNxUI+sRRiuk Dec 3 03:02:09 localhost certmonger[39655]: BZ7Psv0YISq45/tsrJZ8xTsHAUZ5Oa0on1j2q/LNSTHlVLzp30/l6zaYwRX5ON/l Dec 3 03:02:09 localhost certmonger[39655]: 0ClL86jk90yyfWYXdInNd0KnY7enX70fx2GrYyy804Yyj+Nfh4edfoLBBjdIWWJp Dec 3 03:02:09 localhost certmonger[39655]: sxGcoFoPAgMBAAGgggFTMCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANQAxADIAMAAz Dec 3 03:02:09 localhost certmonger[39655]: ADAAOAAwADIAMAA4MIIBIgYJKoZIhvcNAQkOMYIBEzCCAQ8wCwYDVR0PBAQDAgWg Dec 3 03:02:09 localhost certmonger[39655]: MIGzBgNVHREEgaswgaiCHW5wMDAwNTU0MzIyNi5zdG9yYWdlLm9vby50ZXN0oDsG Dec 3 03:02:09 localhost certmonger[39655]: CisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU1NDMyMjYuc3RvcmFnZS5vb28udGVz Dec 3 03:02:09 localhost certmonger[39655]: dEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5URVNUoTAwLqADAgEBoScw Dec 3 03:02:09 localhost certmonger[39655]: JRsESFRUUBsdbnAwMDA1NTQzMjI2LnN0b3JhZ2Uub29vLnRlc3QwHQYDVR0lBBYw Dec 3 03:02:09 localhost certmonger[39655]: FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFKGs Dec 3 03:02:09 localhost certmonger[39655]: Swxk/HNw5ue/TPKRY+JULUgbMA0GCSqGSIb3DQEBCwUAA4IBAQB9tcoG15iUDD8g Dec 3 03:02:09 localhost certmonger[39655]: eF5YMSbe2LN5jfK7oWC6H0gcI1PjB501RusFpuyANV0Y++xBJRQbpKZQm3Do9NlG Dec 3 03:02:09 localhost certmonger[39655]: EJm0LyyttBeaAR1GQcxRqtSfOBsBGq9bi+IGqOh+QwOqebY7aqFo7GHhBnG0uI2Y Dec 3 03:02:09 localhost certmonger[39655]: rorFBCoq0iIAjZt8NodYi07vOhIgqY+UG/WvjD9QbqpC+3dnOgmVRtORe09HCmbV Dec 3 03:02:09 localhost certmonger[39655]: Ka5zKTKLMHrhojvYAjx+7HCNVk0wVG+myeCXXXV7JDFg3gQKQJYB6to2OfKxHao/ Dec 3 03:02:09 localhost certmonger[39655]: mOnLYtYxys+nKmmyFzLUzAdRO5srTW76AnbsWl3V5L+MrdlL+2WPSayrpQZHuuUM Dec 3 03:02:09 localhost certmonger[39655]: +kffZ43v Dec 3 03:02:09 localhost certmonger[39655]: -----END CERTIFICATE REQUEST----- Dec 3 03:02:09 localhost certmonger[39655]: " for child. Dec 3 03:02:09 localhost certmonger[39655]: 2025-12-03 08:02:09 [39655] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 03:02:09 localhost certmonger[39655]: 2025-12-03 08:02:09 [39655] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2McEcb/z7FdqNwhIn8mwHs+8XwGfPiJrrggjXtOL7/GhTnTXZoXgd2AOfgsIykm66LBLWQvTEwkveQDUWnvRdj0vwKTgy7Z/a4dbRvpqVg0TqGmlG6r5Q3DQWyRZIWMoYGm2VZ68FloplJ3XIVJ0mKgPT01BiaCRz569AfST9zlYf+jj+K365n4X4cUVbWHMkXTcVCPrEUYrpAWez7L9GCEquOf7bKyWfMU7BwFGeTmtKJ9Y9qvyzUkx5VS86d9P5es2mMEV+Tjf5dApS/Oo5PdMsn1mF3SJzXdCp2O3p1+9H8dhq2MsvNOGMo/jX4eHnX6CwQY3SFliabMRnKBaDwIDAQAB" for child. Dec 3 03:02:09 localhost certmonger[39655]: 2025-12-03 08:02:09 [39655] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 03:02:09 localhost certmonger[39655]: 2025-12-03 08:02:09 [39655] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 03:02:09 localhost certmonger[39655]: 2025-12-03 08:02:09 [39655] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 03:02:09 localhost certmonger[39655]: 2025-12-03 08:02:09 [39655] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:09 localhost certmonger[39655]: 2025-12-03 08:02:09 [39655] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:09 localhost certmonger[39004]: 2025-12-03 08:02:09 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[39655]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 03:02:09 localhost ipa-submit[39655]: JSON-RPC error: 2100: Insufficient access: Insufficient 'add' privilege to add the entry 'krbprincipalname=HTTP/np0005543226.storage.ooo.test@OOO.TEST,cn=services,cn=accounts,dc=ooo,dc=test'. Dec 3 03:02:09 localhost certmonger[39004]: 2025-12-03 08:02:09 [39004] Certificate submission still ongoing. Dec 3 03:02:09 localhost certmonger[39004]: 2025-12-03 08:02:09 [39004] Certificate submission attempt complete. Dec 3 03:02:09 localhost certmonger[39004]: 2025-12-03 08:02:09 [39004] Child status = 2. Dec 3 03:02:09 localhost certmonger[39004]: 2025-12-03 08:02:09 [39004] Child output: Dec 3 03:02:09 localhost certmonger[39004]: "Server at https://ipa.ooo.test/ipa/json denied our request, giving up: 2100 (Insufficient access: Insufficient 'add' privilege to add the entry 'krbprincipalname=HTTP/np0005543226.storage.ooo.test@OOO.TEST,cn=services,cn=accounts,dc=ooo,dc=test'.). Dec 3 03:02:09 localhost certmonger[39004]: " Dec 3 03:02:09 localhost certmonger[39004]: 2025-12-03 08:02:09 [39004] Server at https://ipa.ooo.test/ipa/json denied our request, giving up: 2100 (Insufficient access: Insufficient 'add' privilege to add the entry 'krbprincipalname=HTTP/np0005543226.storage.ooo.test@OOO.TEST,cn=services,cn=accounts,dc=ooo,dc=test'.). Dec 3 03:02:09 localhost certmonger[39004]: 2025-12-03 08:02:09 [39004] Certificate not (yet?) issued. Dec 3 03:02:09 localhost certmonger[39004]: 2025-12-03 08:02:09 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[39004]: 2025-12-03 08:02:09 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[39657]: Request for certificate to be stored in file "/etc/pki/tls/certs/httpd-storage.crt" rejected by CA. Dec 3 03:02:09 localhost certmonger[39004]: 2025-12-03 08:02:09 [39004] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:09 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:09 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:09 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:09 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:09 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:09 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:09 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:09 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:09 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:09 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:09 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:09 localhost python3[39674]: ansible-certificate_request Invoked with name=httpd-storage_mgmt dns=['np0005543226.storagemgmt.ooo.test'] principal=['HTTP/np0005543226.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage_mgmt.crt /etc/pki/tls/certs/httpd/httpd-storage_mgmt.crt#012cp /etc/pki/tls/private/httpd-storage_mgmt.key /etc/pki/tls/private/httpd/httpd-storage_mgmt.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost sshd[39682]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39686]: 2025-12-03 08:02:10 [39686] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543226.storagemgmt.ooo.test" for child. Dec 3 03:02:10 localhost certmonger[39686]: 2025-12-03 08:02:10 [39686] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543226.storagemgmt.ooo.test Dec 3 03:02:10 localhost certmonger[39686]: " for child. Dec 3 03:02:10 localhost certmonger[39686]: 2025-12-03 08:02:10 [39686] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005543226.storagemgmt.ooo.test@OOO.TEST Dec 3 03:02:10 localhost certmonger[39686]: " for child. Dec 3 03:02:10 localhost certmonger[39686]: 2025-12-03 08:02:10 [39686] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 03:02:10 localhost certmonger[39686]: 2025-12-03 08:02:10 [39686] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 03:02:10 localhost certmonger[39686]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI2LnN0b3JhZ2VtZ210 Dec 3 03:02:10 localhost certmonger[39686]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwLEHldgB Dec 3 03:02:10 localhost certmonger[39686]: lv2HPF/mnEMioAC2+PZ2XDUiYvwlOZGqqkkbNdw/QMs/0RTUjh0vTfEm9xlCdDjf Dec 3 03:02:10 localhost certmonger[39686]: JC6WPN52oOi05Jq4t28HZjJSHarMve/r9JLJ1CF5rIlJEandq66nu0FCiY3tyWml Dec 3 03:02:10 localhost certmonger[39686]: ugEIYWuigb/21VXUlDBlhSnluHQ8AAXRFUmk6AlHBIYZqHkv+UOk6IGHzvwFC8GP Dec 3 03:02:10 localhost certmonger[39686]: Os1JxkNtAzM9EwybEE+xRKKtCCf/4q86p7/tveWUi2Wq1t1TsZNRpK6PeNluXKvz Dec 3 03:02:10 localhost certmonger[39686]: fCmsbPTCgEESdG66fhoW9CposyRYYztd+eW2DsaEEQNDU405jyWW4TiDYWvqqpGx Dec 3 03:02:10 localhost certmonger[39686]: wgh9sR8sizz7GQIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 03:02:10 localhost certmonger[39686]: ADAAMwAwADgAMAAyADEAMDCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Dec 3 03:02:10 localhost certmonger[39686]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU1NDMyMjYuc3RvcmFnZW1nbXQub29v Dec 3 03:02:10 localhost certmonger[39686]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTU0MzIyNi5zdG9yYWdl Dec 3 03:02:10 localhost certmonger[39686]: bWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Dec 3 03:02:10 localhost certmonger[39686]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTQzMjI2LnN0b3JhZ2VtZ210Lm9v Dec 3 03:02:10 localhost certmonger[39686]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Dec 3 03:02:10 localhost certmonger[39686]: AjAAMB0GA1UdDgQWBBRWEyyZOKsIVlHiT283bUjj0rjy6jANBgkqhkiG9w0BAQsF Dec 3 03:02:10 localhost certmonger[39686]: AAOCAQEARt1Lbh9LALzlkT14mtOZ1bDK8QPxqFPuEpzwdgZaVr5DSyCgfwytWyFG Dec 3 03:02:10 localhost certmonger[39686]: 5KXDGjm7rR3SF9JuSk8YvmagRV0A/7sF5KqdKr+3APQe3FyzD0rlQBN+LEwPEe4i Dec 3 03:02:10 localhost certmonger[39686]: Hw7TDQlvIxSoAVueanBIBxmJIBN8I6duhNfRtPcFEesiPMztG8P5DrIMyANeO00V Dec 3 03:02:10 localhost certmonger[39686]: bsSF9BokdpTz6n/Gbe/nC3tSHvrP8iVa4cndzcZVZpBALpsPCwy9QkoWyxuP9Sdh Dec 3 03:02:10 localhost certmonger[39686]: pFD813ouVyTcg9CnUG/2Gt7tyT8oe9N/hacym5oOZL4EgSpjZiF108sRkhnaHaqW Dec 3 03:02:10 localhost certmonger[39686]: LYnFREqDafeZjNGWUrvp7nSJR8/0Fg== Dec 3 03:02:10 localhost certmonger[39686]: -----END CERTIFICATE REQUEST----- Dec 3 03:02:10 localhost certmonger[39686]: " for child. Dec 3 03:02:10 localhost certmonger[39686]: 2025-12-03 08:02:10 [39686] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 03:02:10 localhost certmonger[39686]: 2025-12-03 08:02:10 [39686] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwLEHldgBlv2HPF/mnEMioAC2+PZ2XDUiYvwlOZGqqkkbNdw/QMs/0RTUjh0vTfEm9xlCdDjfJC6WPN52oOi05Jq4t28HZjJSHarMve/r9JLJ1CF5rIlJEandq66nu0FCiY3tyWmlugEIYWuigb/21VXUlDBlhSnluHQ8AAXRFUmk6AlHBIYZqHkv+UOk6IGHzvwFC8GPOs1JxkNtAzM9EwybEE+xRKKtCCf/4q86p7/tveWUi2Wq1t1TsZNRpK6PeNluXKvzfCmsbPTCgEESdG66fhoW9CposyRYYztd+eW2DsaEEQNDU405jyWW4TiDYWvqqpGxwgh9sR8sizz7GQIDAQAB" for child. Dec 3 03:02:10 localhost certmonger[39686]: 2025-12-03 08:02:10 [39686] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 03:02:10 localhost certmonger[39686]: 2025-12-03 08:02:10 [39686] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 03:02:10 localhost certmonger[39686]: 2025-12-03 08:02:10 [39686] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 03:02:10 localhost certmonger[39686]: 2025-12-03 08:02:10 [39686] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:10 localhost certmonger[39686]: 2025-12-03 08:02:10 [39686] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39686]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost certmonger[39686]: Certificate: "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" Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Certificate submission still ongoing. Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Certificate submission attempt complete. Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Child status = 0. Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Child output: Dec 3 03:02:10 localhost certmonger[39004]: "-----BEGIN CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[39004]: MIIFVTCCA72gAwIBAgIBFDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:10 localhost certmonger[39004]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:10 localhost certmonger[39004]: MDIxMFoXDTI3MTIwNDA4MDIxMFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:10 localhost certmonger[39004]: BAMMIW5wMDAwNTU0MzIyNi5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:10 localhost certmonger[39004]: hvcNAQEBBQADggEPADCCAQoCggEBAMCxB5XYAZb9hzxf5pxDIqAAtvj2dlw1ImL8 Dec 3 03:02:10 localhost certmonger[39004]: JTmRqqpJGzXcP0DLP9EU1I4dL03xJvcZQnQ43yQuljzedqDotOSauLdvB2YyUh2q Dec 3 03:02:10 localhost certmonger[39004]: zL3v6/SSydQheayJSRGp3auup7tBQomN7clppboBCGFrooG/9tVV1JQwZYUp5bh0 Dec 3 03:02:10 localhost certmonger[39004]: PAAF0RVJpOgJRwSGGah5L/lDpOiBh878BQvBjzrNScZDbQMzPRMMmxBPsUSirQgn Dec 3 03:02:10 localhost certmonger[39004]: /+KvOqe/7b3llItlqtbdU7GTUaSuj3jZblyr83wprGz0woBBEnRuun4aFvQqaLMk Dec 3 03:02:10 localhost certmonger[39004]: WGM7Xfnltg7GhBEDQ1ONOY8lluE4g2Fr6qqRscIIfbEfLIs8+xkCAwEAAaOCAeYw Dec 3 03:02:10 localhost certmonger[39004]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:10 localhost certmonger[39004]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:10 localhost certmonger[39004]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:10 localhost certmonger[39004]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:10 localhost certmonger[39004]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:10 localhost certmonger[39004]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFHq5lai84tlZwTGH36B7ZDAY Dec 3 03:02:10 localhost certmonger[39004]: 6ZzBMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNi5zdG9yYWdlbWdtdC5vb28u Dec 3 03:02:10 localhost certmonger[39004]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI2LnN0b3JhZ2Vt Dec 3 03:02:10 localhost certmonger[39004]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:10 localhost certmonger[39004]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjYuc3RvcmFnZW1nbXQub29v Dec 3 03:02:10 localhost certmonger[39004]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAEFs95WxMseF7+eDtwa5AmawSB2V1qln Dec 3 03:02:10 localhost certmonger[39004]: d7T1t2Z0AczoGGNfaQBcTraEF0aN3Oi5jwBzUQN1m/hMcvn+lxognkXShILPFvmx Dec 3 03:02:10 localhost certmonger[39004]: VB9CctzvAjE8nTi/VPq1/ttB5FDWwMlWA56FxnA2ricOeuHkwar9hPjkWI5CcM4Y Dec 3 03:02:10 localhost certmonger[39004]: ScKJElWLsHq+F4rJrjPgjkhp2l7FUYv+StYC4vZn7ALvuo4fZpfaAYyrzbe/wJLO Dec 3 03:02:10 localhost certmonger[39004]: jiWFvMiBckckxf7yairR9g9QoDhg/eBK9KK1dG7WpLaje0kFtvRannUJW2uKBoFk Dec 3 03:02:10 localhost certmonger[39004]: phPxUW/EIUUlaHCuHYmDIUG0BJzv0GcYzqg5v/Kifs32RQIDar4EQlq1vTY1Hha6 Dec 3 03:02:10 localhost certmonger[39004]: f6zlEE1XFXOwW5Cvr4S967AlASQ2lWKHMdq632LO7CjYuOyXDsbISldR8YG6Jjnx Dec 3 03:02:10 localhost certmonger[39004]: dAVy0C3cBLI+XI+R9Gu/K7RtzF+t8f18ECixplKtGO6JV3JvtsWn0cKjL6/5wYHX Dec 3 03:02:10 localhost certmonger[39004]: H55Vs0MXwcbKuWSYPc0Lj13AIdTylzfszw== Dec 3 03:02:10 localhost certmonger[39004]: -----END CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[39004]: " Dec 3 03:02:10 localhost certmonger[39688]: 2025-12-03 08:02:10 [39688] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[39688]: MIIFVTCCA72gAwIBAgIBFDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:10 localhost certmonger[39688]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:10 localhost certmonger[39688]: MDIxMFoXDTI3MTIwNDA4MDIxMFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:10 localhost certmonger[39688]: BAMMIW5wMDAwNTU0MzIyNi5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:10 localhost certmonger[39688]: hvcNAQEBBQADggEPADCCAQoCggEBAMCxB5XYAZb9hzxf5pxDIqAAtvj2dlw1ImL8 Dec 3 03:02:10 localhost certmonger[39688]: JTmRqqpJGzXcP0DLP9EU1I4dL03xJvcZQnQ43yQuljzedqDotOSauLdvB2YyUh2q Dec 3 03:02:10 localhost certmonger[39688]: zL3v6/SSydQheayJSRGp3auup7tBQomN7clppboBCGFrooG/9tVV1JQwZYUp5bh0 Dec 3 03:02:10 localhost certmonger[39688]: PAAF0RVJpOgJRwSGGah5L/lDpOiBh878BQvBjzrNScZDbQMzPRMMmxBPsUSirQgn Dec 3 03:02:10 localhost certmonger[39688]: /+KvOqe/7b3llItlqtbdU7GTUaSuj3jZblyr83wprGz0woBBEnRuun4aFvQqaLMk Dec 3 03:02:10 localhost certmonger[39688]: WGM7Xfnltg7GhBEDQ1ONOY8lluE4g2Fr6qqRscIIfbEfLIs8+xkCAwEAAaOCAeYw Dec 3 03:02:10 localhost certmonger[39688]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:10 localhost certmonger[39688]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:10 localhost certmonger[39688]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:10 localhost certmonger[39688]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:10 localhost certmonger[39688]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:10 localhost certmonger[39688]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFHq5lai84tlZwTGH36B7ZDAY Dec 3 03:02:10 localhost certmonger[39688]: 6ZzBMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNi5zdG9yYWdlbWdtdC5vb28u Dec 3 03:02:10 localhost certmonger[39688]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI2LnN0b3JhZ2Vt Dec 3 03:02:10 localhost certmonger[39688]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:10 localhost certmonger[39688]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjYuc3RvcmFnZW1nbXQub29v Dec 3 03:02:10 localhost certmonger[39688]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAEFs95WxMseF7+eDtwa5AmawSB2V1qln Dec 3 03:02:10 localhost certmonger[39688]: d7T1t2Z0AczoGGNfaQBcTraEF0aN3Oi5jwBzUQN1m/hMcvn+lxognkXShILPFvmx Dec 3 03:02:10 localhost certmonger[39688]: VB9CctzvAjE8nTi/VPq1/ttB5FDWwMlWA56FxnA2ricOeuHkwar9hPjkWI5CcM4Y Dec 3 03:02:10 localhost certmonger[39688]: ScKJElWLsHq+F4rJrjPgjkhp2l7FUYv+StYC4vZn7ALvuo4fZpfaAYyrzbe/wJLO Dec 3 03:02:10 localhost certmonger[39688]: jiWFvMiBckckxf7yairR9g9QoDhg/eBK9KK1dG7WpLaje0kFtvRannUJW2uKBoFk Dec 3 03:02:10 localhost certmonger[39688]: phPxUW/EIUUlaHCuHYmDIUG0BJzv0GcYzqg5v/Kifs32RQIDar4EQlq1vTY1Hha6 Dec 3 03:02:10 localhost certmonger[39688]: f6zlEE1XFXOwW5Cvr4S967AlASQ2lWKHMdq632LO7CjYuOyXDsbISldR8YG6Jjnx Dec 3 03:02:10 localhost certmonger[39688]: dAVy0C3cBLI+XI+R9Gu/K7RtzF+t8f18ECixplKtGO6JV3JvtsWn0cKjL6/5wYHX Dec 3 03:02:10 localhost certmonger[39688]: H55Vs0MXwcbKuWSYPc0Lj13AIdTylzfszw== Dec 3 03:02:10 localhost certmonger[39688]: -----END CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[39688]: ". Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Certificate submission still ongoing. Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Certificate submission postprocessing complete. Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Child status = 0. Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Child output: Dec 3 03:02:10 localhost certmonger[39004]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nH55Vs0MXwcbKuWSYPc0Lj13AIdTylzfszw==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 03:02:10 localhost certmonger[39004]: " Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[39004]: MIIFVTCCA72gAwIBAgIBFDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:10 localhost certmonger[39004]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:10 localhost certmonger[39004]: MDIxMFoXDTI3MTIwNDA4MDIxMFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:10 localhost certmonger[39004]: BAMMIW5wMDAwNTU0MzIyNi5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:10 localhost certmonger[39004]: hvcNAQEBBQADggEPADCCAQoCggEBAMCxB5XYAZb9hzxf5pxDIqAAtvj2dlw1ImL8 Dec 3 03:02:10 localhost certmonger[39004]: JTmRqqpJGzXcP0DLP9EU1I4dL03xJvcZQnQ43yQuljzedqDotOSauLdvB2YyUh2q Dec 3 03:02:10 localhost certmonger[39004]: zL3v6/SSydQheayJSRGp3auup7tBQomN7clppboBCGFrooG/9tVV1JQwZYUp5bh0 Dec 3 03:02:10 localhost certmonger[39004]: PAAF0RVJpOgJRwSGGah5L/lDpOiBh878BQvBjzrNScZDbQMzPRMMmxBPsUSirQgn Dec 3 03:02:10 localhost certmonger[39004]: /+KvOqe/7b3llItlqtbdU7GTUaSuj3jZblyr83wprGz0woBBEnRuun4aFvQqaLMk Dec 3 03:02:10 localhost certmonger[39004]: WGM7Xfnltg7GhBEDQ1ONOY8lluE4g2Fr6qqRscIIfbEfLIs8+xkCAwEAAaOCAeYw Dec 3 03:02:10 localhost certmonger[39004]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:10 localhost certmonger[39004]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:10 localhost certmonger[39004]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:10 localhost certmonger[39004]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:10 localhost certmonger[39004]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:10 localhost certmonger[39004]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFHq5lai84tlZwTGH36B7ZDAY Dec 3 03:02:10 localhost certmonger[39004]: 6ZzBMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNi5zdG9yYWdlbWdtdC5vb28u Dec 3 03:02:10 localhost certmonger[39004]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI2LnN0b3JhZ2Vt Dec 3 03:02:10 localhost certmonger[39004]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:10 localhost certmonger[39004]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjYuc3RvcmFnZW1nbXQub29v Dec 3 03:02:10 localhost certmonger[39004]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAEFs95WxMseF7+eDtwa5AmawSB2V1qln Dec 3 03:02:10 localhost certmonger[39004]: d7T1t2Z0AczoGGNfaQBcTraEF0aN3Oi5jwBzUQN1m/hMcvn+lxognkXShILPFvmx Dec 3 03:02:10 localhost certmonger[39004]: VB9CctzvAjE8nTi/VPq1/ttB5FDWwMlWA56FxnA2ricOeuHkwar9hPjkWI5CcM4Y Dec 3 03:02:10 localhost certmonger[39004]: ScKJElWLsHq+F4rJrjPgjkhp2l7FUYv+StYC4vZn7ALvuo4fZpfaAYyrzbe/wJLO Dec 3 03:02:10 localhost certmonger[39004]: jiWFvMiBckckxf7yairR9g9QoDhg/eBK9KK1dG7WpLaje0kFtvRannUJW2uKBoFk Dec 3 03:02:10 localhost certmonger[39004]: phPxUW/EIUUlaHCuHYmDIUG0BJzv0GcYzqg5v/Kifs32RQIDar4EQlq1vTY1Hha6 Dec 3 03:02:10 localhost certmonger[39004]: f6zlEE1XFXOwW5Cvr4S967AlASQ2lWKHMdq632LO7CjYuOyXDsbISldR8YG6Jjnx Dec 3 03:02:10 localhost certmonger[39004]: dAVy0C3cBLI+XI+R9Gu/K7RtzF+t8f18ECixplKtGO6JV3JvtsWn0cKjL6/5wYHX Dec 3 03:02:10 localhost certmonger[39004]: H55Vs0MXwcbKuWSYPc0Lj13AIdTylzfszw== Dec 3 03:02:10 localhost certmonger[39004]: -----END CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[39004]: ". Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Certificate issued (0 chain certificates, 0 roots). Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] No hooks set for pre-save command. Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39696]: Certificate in file "/etc/pki/tls/certs/httpd-storage_mgmt.crt" issued by CA and saved. Dec 3 03:02:10 localhost certmonger[39004]: 2025-12-03 08:02:10 [39004] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost python3[39712]: ansible-certificate_request Invoked with name=httpd-internal_api dns=['np0005543226.internalapi.ooo.test'] principal=['HTTP/np0005543226.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-internal_api.crt /etc/pki/tls/certs/httpd/httpd-internal_api.crt#012cp /etc/pki/tls/private/httpd-internal_api.key /etc/pki/tls/private/httpd/httpd-internal_api.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost certmonger[39004]: 2025-12-03 08:02:11 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[39004]: 2025-12-03 08:02:11 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[39004]: 2025-12-03 08:02:11 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[39004]: 2025-12-03 08:02:11 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[39004]: 2025-12-03 08:02:11 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[39004]: 2025-12-03 08:02:11 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[39004]: 2025-12-03 08:02:11 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[39004]: 2025-12-03 08:02:11 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[39004]: 2025-12-03 08:02:11 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39722]: 2025-12-03 08:02:12 [39722] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543226.internalapi.ooo.test" for child. Dec 3 03:02:12 localhost certmonger[39722]: 2025-12-03 08:02:12 [39722] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543226.internalapi.ooo.test Dec 3 03:02:12 localhost certmonger[39722]: " for child. Dec 3 03:02:12 localhost certmonger[39722]: 2025-12-03 08:02:12 [39722] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005543226.internalapi.ooo.test@OOO.TEST Dec 3 03:02:12 localhost certmonger[39722]: " for child. Dec 3 03:02:12 localhost certmonger[39722]: 2025-12-03 08:02:12 [39722] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 03:02:12 localhost certmonger[39722]: 2025-12-03 08:02:12 [39722] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 03:02:12 localhost certmonger[39722]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI2LmludGVybmFsYXBp Dec 3 03:02:12 localhost certmonger[39722]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr2196Aay Dec 3 03:02:12 localhost certmonger[39722]: mMzJ37n8NsFlvB0kYn8dLoNvKAyFKON7kkLUkARQVwp/aFpTsbraLPnBwBPubewp Dec 3 03:02:12 localhost certmonger[39722]: DX5UrAL7HB562yWvnGp3u9qLfjzFyWEhbr/ro2fPPJ/GNqGIUO0fF6KUK0h3lZFl Dec 3 03:02:12 localhost certmonger[39722]: 44bexT3PTrQyG+a18/5ep0PDXAexbdzKAsTyu94czC97gNVGZGJRVy+nCt8Tolo0 Dec 3 03:02:12 localhost certmonger[39722]: 2etJgUC3A7vaGwDiayz7izPK5MFCiATbljUPdv4CWHSF6ZpxDG8aB/ncPahbuWXi Dec 3 03:02:12 localhost certmonger[39722]: CPZFvNghgDt4bjwmi4C2BLP/tHAJvyATVIbeNRogAZPNMHNzaIupS+gG0xx6ic6F Dec 3 03:02:12 localhost certmonger[39722]: WH3wkWQ/f14oWQIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 03:02:12 localhost certmonger[39722]: ADAAMwAwADgAMAAyADEAMTCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Dec 3 03:02:12 localhost certmonger[39722]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU1NDMyMjYuaW50ZXJuYWxhcGkub29v Dec 3 03:02:12 localhost certmonger[39722]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTU0MzIyNi5pbnRlcm5h Dec 3 03:02:12 localhost certmonger[39722]: bGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Dec 3 03:02:12 localhost certmonger[39722]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTQzMjI2LmludGVybmFsYXBpLm9v Dec 3 03:02:12 localhost certmonger[39722]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Dec 3 03:02:12 localhost certmonger[39722]: AjAAMB0GA1UdDgQWBBQJf+2v9Evrn4OAJVWmAr3RMLLJCjANBgkqhkiG9w0BAQsF Dec 3 03:02:12 localhost certmonger[39722]: AAOCAQEAOGbhd8NfXvDzOJf02F4AwG5GTXhr/41kgXGShhgxA7Gt87ahA0XvPzTl Dec 3 03:02:12 localhost certmonger[39722]: EfFsiEfJPpuggK96v6g82GRm3+77u8ppCJdGfXxOOio7XUfs1qpfwgwpqN1ZzbV+ Dec 3 03:02:12 localhost certmonger[39722]: H9zGxZhNJE6G/92l9jpabKJQJBbrVQVmJd75xYeWHgI0Plo4KxknDgnTF6LO3ecd Dec 3 03:02:12 localhost certmonger[39722]: Fk+xR8TkBA+yjepAUiIWks7BwQST2EH5CBXmTrvfTjHFnrZ3pn0Jr+E1b2Bdt0FF Dec 3 03:02:12 localhost certmonger[39722]: e3Y/Vjm8J022TgcXSKNjTupTxrstpYVISJiDf+JRIUs4XAm8OFwhQA6qHcMCjHyL Dec 3 03:02:12 localhost certmonger[39722]: v8oUJHafTjqnkEMylH3NdDNjuybZsg== Dec 3 03:02:12 localhost certmonger[39722]: -----END CERTIFICATE REQUEST----- Dec 3 03:02:12 localhost certmonger[39722]: " for child. Dec 3 03:02:12 localhost certmonger[39722]: 2025-12-03 08:02:12 [39722] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvbX3oBrKYzMnfufw2wWW8HSRifx0ug28oDIUo43uSQtSQBFBXCn9oWlOxutos+cHAE+5t7CkNflSsAvscHnrbJa+cane72ot+PMXJYSFuv+ujZ888n8Y2oYhQ7R8XopQrSHeVkWXjht7FPc9OtDIb5rXz/l6nQ8NcB7Ft3MoCxPK73hzML3uA1UZkYlFXL6cK3xOiWjTZ60mBQLcDu9obAOJrLPuLM8rkwUKIBNuWNQ92/gJYdIXpmnEMbxoH+dw9qFu5ZeII9kW82CGAO3huPCaLgLYEs/+0cAm/IBNUht41GiABk80wc3Noi6lL6AbTHHqJzoVYffCRZD9/XihZAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAo/q3Z/y3XYs6u2Iy3E4hK++AvLnxGneZk1IuKl12q/V3I1XiOyAsPND3b18UMUaeiggBiK11ZOf0uqyKNx6TinGPZxVi1kNaZwdE/tLr5OmD/smzBCT6bRFogUpksVOStlhFguO0Jys63QeofRwzlhlknfq87wI9ox5PMazo1c/eWN3mB5t5uh/sXBDUb5ePntxe7SK7cBoYplRyWbkAtIotgBnVLAFpr1w2iXTxbDzbmNxElyxb+U8DfdWN/+/jgU/nmF+l72dOd41MHEcRuOgJLzXyCutmO05e5/xKbJT8MmlVbYKATgIkL+V/l8m2Mm0fX2n/OUyNyI6SMmJujQ==" for child. Dec 3 03:02:12 localhost certmonger[39722]: 2025-12-03 08:02:12 [39722] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr2196AaymMzJ37n8NsFlvB0kYn8dLoNvKAyFKON7kkLUkARQVwp/aFpTsbraLPnBwBPubewpDX5UrAL7HB562yWvnGp3u9qLfjzFyWEhbr/ro2fPPJ/GNqGIUO0fF6KUK0h3lZFl44bexT3PTrQyG+a18/5ep0PDXAexbdzKAsTyu94czC97gNVGZGJRVy+nCt8Tolo02etJgUC3A7vaGwDiayz7izPK5MFCiATbljUPdv4CWHSF6ZpxDG8aB/ncPahbuWXiCPZFvNghgDt4bjwmi4C2BLP/tHAJvyATVIbeNRogAZPNMHNzaIupS+gG0xx6ic6FWH3wkWQ/f14oWQIDAQAB" for child. Dec 3 03:02:12 localhost certmonger[39722]: 2025-12-03 08:02:12 [39722] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 03:02:12 localhost certmonger[39722]: 2025-12-03 08:02:12 [39722] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 03:02:12 localhost certmonger[39722]: 2025-12-03 08:02:12 [39722] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 03:02:12 localhost certmonger[39722]: 2025-12-03 08:02:12 [39722] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:12 localhost certmonger[39722]: 2025-12-03 08:02:12 [39722] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost certmonger[39722]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost certmonger[39722]: Certificate: "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" Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Certificate submission still ongoing. Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Certificate submission attempt complete. Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Child status = 0. Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Child output: Dec 3 03:02:12 localhost certmonger[39004]: "-----BEGIN CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[39004]: MIIFVTCCA72gAwIBAgIBFzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:12 localhost certmonger[39004]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:12 localhost certmonger[39004]: MDIxMloXDTI3MTIwNDA4MDIxMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:12 localhost certmonger[39004]: BAMMIW5wMDAwNTU0MzIyNi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:12 localhost certmonger[39004]: hvcNAQEBBQADggEPADCCAQoCggEBAK9tfegGspjMyd+5/DbBZbwdJGJ/HS6DbygM Dec 3 03:02:12 localhost certmonger[39004]: hSjje5JC1JAEUFcKf2haU7G62iz5wcAT7m3sKQ1+VKwC+xweetslr5xqd7vai348 Dec 3 03:02:12 localhost certmonger[39004]: xclhIW6/66NnzzyfxjahiFDtHxeilCtId5WRZeOG3sU9z060MhvmtfP+XqdDw1wH Dec 3 03:02:12 localhost certmonger[39004]: sW3cygLE8rveHMwve4DVRmRiUVcvpwrfE6JaNNnrSYFAtwO72hsA4mss+4szyuTB Dec 3 03:02:12 localhost certmonger[39004]: QogE25Y1D3b+Alh0hemacQxvGgf53D2oW7ll4gj2RbzYIYA7eG48JouAtgSz/7Rw Dec 3 03:02:12 localhost certmonger[39004]: Cb8gE1SG3jUaIAGTzTBzc2iLqUvoBtMceonOhVh98JFkP39eKFkCAwEAAaOCAeYw Dec 3 03:02:12 localhost certmonger[39004]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:12 localhost certmonger[39004]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:12 localhost certmonger[39004]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:12 localhost certmonger[39004]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:12 localhost certmonger[39004]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:12 localhost certmonger[39004]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFPq00Twbc3bdXyhlQXnbqntV Dec 3 03:02:12 localhost certmonger[39004]: uxSFMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNi5pbnRlcm5hbGFwaS5vb28u Dec 3 03:02:12 localhost certmonger[39004]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI2LmludGVybmFs Dec 3 03:02:12 localhost certmonger[39004]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:12 localhost certmonger[39004]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjYuaW50ZXJuYWxhcGkub29v Dec 3 03:02:12 localhost certmonger[39004]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAHrAU3VlZchPaHdF5xvNeMaP6swgRHuj Dec 3 03:02:12 localhost certmonger[39004]: 0KDZY0Sjg5x66O3mGvmFpECp84AJA247WV76Y41s7cv2I+bVPAkDHgRLowddRK5L Dec 3 03:02:12 localhost certmonger[39004]: SRzigePLcWNcGyG1St0d9FCeU5SBbolfDuKKfTYy8Om/pQIoxcbs7Plf2cYk7Bkt Dec 3 03:02:12 localhost certmonger[39004]: jgzYMG1KHGfT5uv4Urn/+girVPNRJrYG6eIhlUR00thkw5OZnQJeIDR0dqWiMNIZ Dec 3 03:02:12 localhost certmonger[39004]: R0UoLmCp1AFGXmqhq2UialgM5oeS8k+8YHtY9B5R7HUHYIwvGXWbBPLs96eQoNCX Dec 3 03:02:12 localhost certmonger[39004]: Yt9lqauSTCoacUg13+ncCyGjFKNPg9DmSrwq7a67gz/JQ9c+gRv53WAV4iYzmtiS Dec 3 03:02:12 localhost certmonger[39004]: KiSmiJ3DtjIBffJPM3z4o/v929ub3jEF/qXEivOvPz+0HnSEHxyIu4BFDQeliWdi Dec 3 03:02:12 localhost certmonger[39004]: U8MlNGWnBzGRi1cc/J/SZ3k0nfUGq0YsqLsAN7cKYXN+cR7pv+6nu6lSlXmE+7b+ Dec 3 03:02:12 localhost certmonger[39004]: noVR2PSQoW7enfFH0moo7POCm/kl2Ng1EA== Dec 3 03:02:12 localhost certmonger[39004]: -----END CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[39004]: " Dec 3 03:02:12 localhost certmonger[39724]: 2025-12-03 08:02:12 [39724] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[39724]: MIIFVTCCA72gAwIBAgIBFzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:12 localhost certmonger[39724]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:12 localhost certmonger[39724]: MDIxMloXDTI3MTIwNDA4MDIxMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:12 localhost certmonger[39724]: BAMMIW5wMDAwNTU0MzIyNi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:12 localhost certmonger[39724]: hvcNAQEBBQADggEPADCCAQoCggEBAK9tfegGspjMyd+5/DbBZbwdJGJ/HS6DbygM Dec 3 03:02:12 localhost certmonger[39724]: hSjje5JC1JAEUFcKf2haU7G62iz5wcAT7m3sKQ1+VKwC+xweetslr5xqd7vai348 Dec 3 03:02:12 localhost certmonger[39724]: xclhIW6/66NnzzyfxjahiFDtHxeilCtId5WRZeOG3sU9z060MhvmtfP+XqdDw1wH Dec 3 03:02:12 localhost certmonger[39724]: sW3cygLE8rveHMwve4DVRmRiUVcvpwrfE6JaNNnrSYFAtwO72hsA4mss+4szyuTB Dec 3 03:02:12 localhost certmonger[39724]: QogE25Y1D3b+Alh0hemacQxvGgf53D2oW7ll4gj2RbzYIYA7eG48JouAtgSz/7Rw Dec 3 03:02:12 localhost certmonger[39724]: Cb8gE1SG3jUaIAGTzTBzc2iLqUvoBtMceonOhVh98JFkP39eKFkCAwEAAaOCAeYw Dec 3 03:02:12 localhost certmonger[39724]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:12 localhost certmonger[39724]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:12 localhost certmonger[39724]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:12 localhost certmonger[39724]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:12 localhost certmonger[39724]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:12 localhost certmonger[39724]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFPq00Twbc3bdXyhlQXnbqntV Dec 3 03:02:12 localhost certmonger[39724]: uxSFMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNi5pbnRlcm5hbGFwaS5vb28u Dec 3 03:02:12 localhost certmonger[39724]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI2LmludGVybmFs Dec 3 03:02:12 localhost certmonger[39724]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:12 localhost certmonger[39724]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjYuaW50ZXJuYWxhcGkub29v Dec 3 03:02:12 localhost certmonger[39724]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAHrAU3VlZchPaHdF5xvNeMaP6swgRHuj Dec 3 03:02:12 localhost certmonger[39724]: 0KDZY0Sjg5x66O3mGvmFpECp84AJA247WV76Y41s7cv2I+bVPAkDHgRLowddRK5L Dec 3 03:02:12 localhost certmonger[39724]: SRzigePLcWNcGyG1St0d9FCeU5SBbolfDuKKfTYy8Om/pQIoxcbs7Plf2cYk7Bkt Dec 3 03:02:12 localhost certmonger[39724]: jgzYMG1KHGfT5uv4Urn/+girVPNRJrYG6eIhlUR00thkw5OZnQJeIDR0dqWiMNIZ Dec 3 03:02:12 localhost certmonger[39724]: R0UoLmCp1AFGXmqhq2UialgM5oeS8k+8YHtY9B5R7HUHYIwvGXWbBPLs96eQoNCX Dec 3 03:02:12 localhost certmonger[39724]: Yt9lqauSTCoacUg13+ncCyGjFKNPg9DmSrwq7a67gz/JQ9c+gRv53WAV4iYzmtiS Dec 3 03:02:12 localhost certmonger[39724]: KiSmiJ3DtjIBffJPM3z4o/v929ub3jEF/qXEivOvPz+0HnSEHxyIu4BFDQeliWdi Dec 3 03:02:12 localhost certmonger[39724]: U8MlNGWnBzGRi1cc/J/SZ3k0nfUGq0YsqLsAN7cKYXN+cR7pv+6nu6lSlXmE+7b+ Dec 3 03:02:12 localhost certmonger[39724]: noVR2PSQoW7enfFH0moo7POCm/kl2Ng1EA== Dec 3 03:02:12 localhost certmonger[39724]: -----END CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[39724]: ". Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Certificate submission still ongoing. Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Certificate submission postprocessing complete. Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Child status = 0. Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Child output: Dec 3 03:02:12 localhost certmonger[39004]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFVTCCA72gAwIBAgIBFzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u\nVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4\nMDIxMloXDTI3MTIwNDA4MDIxMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV\nBAMMIW5wMDAwNTU0MzIyNi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI\nhvcNAQEBBQADggEPADCCAQoCggEBAK9tfegGspjMyd+5/DbBZbwdJGJ/HS6DbygM\nhSjje5JC1JAEUFcKf2haU7G62iz5wcAT7m3sKQ1+VKwC+xweetslr5xqd7vai348\nxclhIW6/66NnzzyfxjahiFDtHxeilCtId5WRZeOG3sU9z060MhvmtfP+XqdDw1wH\nsW3cygLE8rveHMwve4DVRmRiUVcvpwrfE6JaNNnrSYFAtwO72hsA4mss+4szyuTB\nQogE25Y1D3b+Alh0hemacQxvGgf53D2oW7ll4gj2RbzYIYA7eG48JouAtgSz/7Rw\nCb8gE1SG3jUaIAGTzTBzc2iLqUvoBtMceonOhVh98JFkP39eKFkCAwEAAaOCAeYw\nggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB\nBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw\nMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw\ncwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js\nL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD\nZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFPq00Twbc3bdXyhlQXnbqntV\nuxSFMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNi5pbnRlcm5hbGFwaS5vb28u\ndGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI2LmludGVybmFs\nYXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh\nNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjYuaW50ZXJuYWxhcGkub29v\nLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAHrAU3VlZchPaHdF5xvNeMaP6swgRHuj\n0KDZY0Sjg5x66O3mGvmFpECp84AJA247WV76Y41s7cv2I+bVPAkDHgRLowddRK5L\nSRzigePLcWNcGyG1St0d9FCeU5SBbolfDuKKfTYy8Om/pQIoxcbs7Plf2cYk7Bkt\njgzYMG1KHGfT5uv4Urn/+girVPNRJrYG6eIhlUR00thkw5OZnQJeIDR0dqWiMNIZ\nR0UoLmCp1AFGXmqhq2UialgM5oeS8k+8YHtY9B5R7HUHYIwvGXWbBPLs96eQoNCX\nYt9lqauSTCoacUg13+ncCyGjFKNPg9DmSrwq7a67gz/JQ9c+gRv53WAV4iYzmtiS\nKiSmiJ3DtjIBffJPM3z4o/v929ub3jEF/qXEivOvPz+0HnSEHxyIu4BFDQeliWdi\nU8MlNGWnBzGRi1cc/J/SZ3k0nfUGq0YsqLsAN7cKYXN+cR7pv+6nu6lSlXmE+7b+\nnoVR2PSQoW7enfFH0moo7POCm/kl2Ng1EA==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 03:02:12 localhost certmonger[39004]: " Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[39004]: MIIFVTCCA72gAwIBAgIBFzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:12 localhost certmonger[39004]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:12 localhost certmonger[39004]: MDIxMloXDTI3MTIwNDA4MDIxMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:12 localhost certmonger[39004]: BAMMIW5wMDAwNTU0MzIyNi5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:12 localhost certmonger[39004]: hvcNAQEBBQADggEPADCCAQoCggEBAK9tfegGspjMyd+5/DbBZbwdJGJ/HS6DbygM Dec 3 03:02:12 localhost certmonger[39004]: hSjje5JC1JAEUFcKf2haU7G62iz5wcAT7m3sKQ1+VKwC+xweetslr5xqd7vai348 Dec 3 03:02:12 localhost certmonger[39004]: xclhIW6/66NnzzyfxjahiFDtHxeilCtId5WRZeOG3sU9z060MhvmtfP+XqdDw1wH Dec 3 03:02:12 localhost certmonger[39004]: sW3cygLE8rveHMwve4DVRmRiUVcvpwrfE6JaNNnrSYFAtwO72hsA4mss+4szyuTB Dec 3 03:02:12 localhost certmonger[39004]: QogE25Y1D3b+Alh0hemacQxvGgf53D2oW7ll4gj2RbzYIYA7eG48JouAtgSz/7Rw Dec 3 03:02:12 localhost certmonger[39004]: Cb8gE1SG3jUaIAGTzTBzc2iLqUvoBtMceonOhVh98JFkP39eKFkCAwEAAaOCAeYw Dec 3 03:02:12 localhost certmonger[39004]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:12 localhost certmonger[39004]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:12 localhost certmonger[39004]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:12 localhost certmonger[39004]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:12 localhost certmonger[39004]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:12 localhost certmonger[39004]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFPq00Twbc3bdXyhlQXnbqntV Dec 3 03:02:12 localhost certmonger[39004]: uxSFMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNi5pbnRlcm5hbGFwaS5vb28u Dec 3 03:02:12 localhost certmonger[39004]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI2LmludGVybmFs Dec 3 03:02:12 localhost certmonger[39004]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:12 localhost certmonger[39004]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjYuaW50ZXJuYWxhcGkub29v Dec 3 03:02:12 localhost certmonger[39004]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAHrAU3VlZchPaHdF5xvNeMaP6swgRHuj Dec 3 03:02:12 localhost certmonger[39004]: 0KDZY0Sjg5x66O3mGvmFpECp84AJA247WV76Y41s7cv2I+bVPAkDHgRLowddRK5L Dec 3 03:02:12 localhost certmonger[39004]: SRzigePLcWNcGyG1St0d9FCeU5SBbolfDuKKfTYy8Om/pQIoxcbs7Plf2cYk7Bkt Dec 3 03:02:12 localhost certmonger[39004]: jgzYMG1KHGfT5uv4Urn/+girVPNRJrYG6eIhlUR00thkw5OZnQJeIDR0dqWiMNIZ Dec 3 03:02:12 localhost certmonger[39004]: R0UoLmCp1AFGXmqhq2UialgM5oeS8k+8YHtY9B5R7HUHYIwvGXWbBPLs96eQoNCX Dec 3 03:02:12 localhost certmonger[39004]: Yt9lqauSTCoacUg13+ncCyGjFKNPg9DmSrwq7a67gz/JQ9c+gRv53WAV4iYzmtiS Dec 3 03:02:12 localhost certmonger[39004]: KiSmiJ3DtjIBffJPM3z4o/v929ub3jEF/qXEivOvPz+0HnSEHxyIu4BFDQeliWdi Dec 3 03:02:12 localhost certmonger[39004]: U8MlNGWnBzGRi1cc/J/SZ3k0nfUGq0YsqLsAN7cKYXN+cR7pv+6nu6lSlXmE+7b+ Dec 3 03:02:12 localhost certmonger[39004]: noVR2PSQoW7enfFH0moo7POCm/kl2Ng1EA== Dec 3 03:02:12 localhost certmonger[39004]: -----END CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[39004]: ". Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Certificate issued (0 chain certificates, 0 roots). Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] No hooks set for pre-save command. Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39732]: Certificate in file "/etc/pki/tls/certs/httpd-internal_api.crt" issued by CA and saved. Dec 3 03:02:12 localhost certmonger[39004]: 2025-12-03 08:02:12 [39004] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost auditd[726]: queue to plugins is full - dropping event Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost auditd[726]: queue to plugins is full - dropping event Dec 3 03:02:12 localhost auditd[726]: queue to plugins is full - dropping event Dec 3 03:02:12 localhost auditd[726]: queue to plugins is full - dropping event Dec 3 03:02:12 localhost auditd[726]: queue to plugins is full - dropping event Dec 3 03:02:12 localhost auditd[726]: auditd queue full reporting limit reached - ending dropped event notifications Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost sshd[39733]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:12 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost python3[39750]: ansible-certificate_request Invoked with name=httpd-external dns=['np0005543226.external.ooo.test'] principal=['HTTP/np0005543226.external.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-external.crt /etc/pki/tls/certs/httpd/httpd-external.crt#012cp /etc/pki/tls/private/httpd-external.key /etc/pki/tls/private/httpd/httpd-external.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39760]: 2025-12-03 08:02:13 [39760] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543226.external.ooo.test" for child. Dec 3 03:02:13 localhost certmonger[39760]: 2025-12-03 08:02:13 [39760] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543226.external.ooo.test Dec 3 03:02:13 localhost certmonger[39760]: " for child. Dec 3 03:02:13 localhost certmonger[39760]: 2025-12-03 08:02:13 [39760] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005543226.external.ooo.test@OOO.TEST Dec 3 03:02:13 localhost certmonger[39760]: " for child. Dec 3 03:02:13 localhost certmonger[39760]: 2025-12-03 08:02:13 [39760] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 03:02:13 localhost certmonger[39760]: 2025-12-03 08:02:13 [39760] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 03:02:13 localhost certmonger[39760]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NTQzMjI2LmV4dGVybmFsLm9v Dec 3 03:02:13 localhost certmonger[39760]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5X1EgEQkC6c1 Dec 3 03:02:13 localhost certmonger[39760]: vHpdyOgbuJvuuhN3X583j11pdDeRtuB7/X3mGOYyqC7HBEo9eyuvQ7a1/F3hI0JZ Dec 3 03:02:13 localhost certmonger[39760]: IlEixb4ffrKMnC2ped5v4WiAvaLLEPizB9Iyhvj8iCugFLA6BzP/YwifpyYh86wF Dec 3 03:02:13 localhost certmonger[39760]: maE7kk6k8vjLhP4u0Ym0DBxDJdjGnbBCh/rb+pnfcCFsQYjw1vGcwupQaIzL9Tv3 Dec 3 03:02:13 localhost certmonger[39760]: W4wyDVKpVCkEbNwqW1gAq38xBhWJNZi3ucjx7H1odnqIOwk6bzj0QuoGVJ0M83mD Dec 3 03:02:13 localhost certmonger[39760]: lHWAAkRWw7rUjWk0acHElPpLzZGD13rsqgyjyi4E0L8dzh4W3iekYR7no8+uBRZr Dec 3 03:02:13 localhost certmonger[39760]: 3g5fiv9MjQIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAyADAA Dec 3 03:02:13 localhost certmonger[39760]: MwAwADgAMAAyADEAMzCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Dec 3 03:02:13 localhost certmonger[39760]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1NDMyMjYuZXh0ZXJuYWwub29vLnRlc3Sg Dec 3 03:02:13 localhost certmonger[39760]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU0MzIyNi5leHRlcm5hbC5vb28u Dec 3 03:02:13 localhost certmonger[39760]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Dec 3 03:02:13 localhost certmonger[39760]: oSgwJhsESFRUUBsebnAwMDA1NTQzMjI2LmV4dGVybmFsLm9vby50ZXN0MB0GA1Ud Dec 3 03:02:13 localhost certmonger[39760]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Dec 3 03:02:13 localhost certmonger[39760]: BBQDpMslnpkv43ymN/auJHu/lE4S5TANBgkqhkiG9w0BAQsFAAOCAQEAP/5uh+Ef Dec 3 03:02:13 localhost certmonger[39760]: 4+CW3EzTZKXDaa8QR+Pmr/efElQBxxKM9Dq0XfFMN9nGHn8bHbCxlI8dS6xr/rHS Dec 3 03:02:13 localhost certmonger[39760]: p2AuKOtQoCPrmmn6iQhxQ5WHxYR2Hg7yHivv/ALAiSpfmdJP7+bU6j2fgmCbCJMH Dec 3 03:02:13 localhost certmonger[39760]: GPatLm21G6GvXht0NWpSA3ssKulDoDxpywt9FaIfpJDzQuNrNocn06ci82nc68qb Dec 3 03:02:13 localhost certmonger[39760]: 1GgahdPRAdASBsc+qkpMPg+2dvVgTYMybPD9sdkndOcoOyDp1f/aOmoF8rnmtFwl Dec 3 03:02:13 localhost certmonger[39760]: ERcsuD5jgMM99Du5ddgLMVsRQIwR+j39bEZBiMMO/b4Gg0XGYONCyExuSHV1QMXx Dec 3 03:02:13 localhost certmonger[39760]: zF971uYzScRxhA== Dec 3 03:02:13 localhost certmonger[39760]: -----END CERTIFICATE REQUEST----- Dec 3 03:02:13 localhost certmonger[39760]: " for child. Dec 3 03:02:13 localhost certmonger[39760]: 2025-12-03 08:02:13 [39760] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDlfUSARCQLpzW8el3I6Bu4m+66E3dfnzePXWl0N5G24Hv9feYY5jKoLscESj17K69DtrX8XeEjQlkiUSLFvh9+soycLal53m/haIC9ossQ+LMH0jKG+PyIK6AUsDoHM/9jCJ+nJiHzrAWZoTuSTqTy+MuE/i7RibQMHEMl2MadsEKH+tv6md9wIWxBiPDW8ZzC6lBojMv1O/dbjDINUqlUKQRs3CpbWACrfzEGFYk1mLe5yPHsfWh2eog7CTpvOPRC6gZUnQzzeYOUdYACRFbDutSNaTRpwcSU+kvNkYPXeuyqDKPKLgTQvx3OHhbeJ6RhHuejz64FFmveDl+K/0yNAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAU6u/6HEK56rag/BtPR5h/XEyLD+6r34ujFzUn4SvsgdctJmz1mxXAQSKlfWVRicDXnnVgC0c5kKPqu8vHJv4WT4K/JOMKpy1WtTKfTDr8aBpaD3xajjFW1MShUSany7TG2TKfaN3zJ4WlFfdLj2VKPu4Tl260pJiFI7gDYeXe+HLBGNg0JJKLXGP/eBNDfMjz/8e8ROSMw4YXOfh5T2SjrKTVD0uduDDL+ipeCgKhARLZWZQ076E7FjDrLeZd9GCzrjtskJ4DZyPnkg6CJfQAYprlSbzw9MP5cP62SwW8lPVLrVfCM2BhEPgwJvyo6X7gf5LUjwm/KdEVHREy6muSw==" for child. Dec 3 03:02:13 localhost certmonger[39760]: 2025-12-03 08:02:13 [39760] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5X1EgEQkC6c1vHpdyOgbuJvuuhN3X583j11pdDeRtuB7/X3mGOYyqC7HBEo9eyuvQ7a1/F3hI0JZIlEixb4ffrKMnC2ped5v4WiAvaLLEPizB9Iyhvj8iCugFLA6BzP/YwifpyYh86wFmaE7kk6k8vjLhP4u0Ym0DBxDJdjGnbBCh/rb+pnfcCFsQYjw1vGcwupQaIzL9Tv3W4wyDVKpVCkEbNwqW1gAq38xBhWJNZi3ucjx7H1odnqIOwk6bzj0QuoGVJ0M83mDlHWAAkRWw7rUjWk0acHElPpLzZGD13rsqgyjyi4E0L8dzh4W3iekYR7no8+uBRZr3g5fiv9MjQIDAQAB" for child. Dec 3 03:02:13 localhost certmonger[39760]: 2025-12-03 08:02:13 [39760] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 03:02:13 localhost certmonger[39760]: 2025-12-03 08:02:13 [39760] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 03:02:13 localhost certmonger[39760]: 2025-12-03 08:02:13 [39760] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 03:02:13 localhost certmonger[39760]: 2025-12-03 08:02:13 [39760] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:13 localhost certmonger[39760]: 2025-12-03 08:02:13 [39760] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost certmonger[39760]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost certmonger[39760]: Certificate: "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" Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Certificate submission still ongoing. Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Certificate submission attempt complete. Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Child status = 0. Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Child output: Dec 3 03:02:13 localhost certmonger[39004]: "-----BEGIN CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[39004]: MIIFSTCCA7GgAwIBAgIBGTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:13 localhost certmonger[39004]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:13 localhost certmonger[39004]: MDIxM1oXDTI3MTIwNDA4MDIxM1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:13 localhost certmonger[39004]: BAMMHm5wMDAwNTU0MzIyNi5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:13 localhost certmonger[39004]: AQEBBQADggEPADCCAQoCggEBAOV9RIBEJAunNbx6XcjoG7ib7roTd1+fN49daXQ3 Dec 3 03:02:13 localhost certmonger[39004]: kbbge/195hjmMqguxwRKPXsrr0O2tfxd4SNCWSJRIsW+H36yjJwtqXneb+FogL2i Dec 3 03:02:13 localhost certmonger[39004]: yxD4swfSMob4/IgroBSwOgcz/2MIn6cmIfOsBZmhO5JOpPL4y4T+LtGJtAwcQyXY Dec 3 03:02:13 localhost certmonger[39004]: xp2wQof62/qZ33AhbEGI8NbxnMLqUGiMy/U791uMMg1SqVQpBGzcKltYAKt/MQYV Dec 3 03:02:13 localhost certmonger[39004]: iTWYt7nI8ex9aHZ6iDsJOm849ELqBlSdDPN5g5R1gAJEVsO61I1pNGnBxJT6S82R Dec 3 03:02:13 localhost certmonger[39004]: g9d67KoMo8ouBNC/Hc4eFt4npGEe56PPrgUWa94OX4r/TI0CAwEAAaOCAd0wggHZ Dec 3 03:02:13 localhost certmonger[39004]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:13 localhost certmonger[39004]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:13 localhost certmonger[39004]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:13 localhost certmonger[39004]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:13 localhost certmonger[39004]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:13 localhost certmonger[39004]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFI7g+/3gG8cV0V1ddLxy/MEVWGXj Dec 3 03:02:13 localhost certmonger[39004]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNi5leHRlcm5hbC5vb28udGVzdKA8 Dec 3 03:02:13 localhost certmonger[39004]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI2LmV4dGVybmFsLm9vby50 Dec 3 03:02:13 localhost certmonger[39004]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:13 localhost certmonger[39004]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjYuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Dec 3 03:02:13 localhost certmonger[39004]: hvcNAQELBQADggGBADiXOt++thIZ5gmqsfbQQ3EZJeWmz/A8eiPTkdx9/XreIhZz Dec 3 03:02:13 localhost certmonger[39004]: byaNrhpzkvtSXAFjLbeXoNZ491dQSzROW24SetMXDP5yrJQ6SSyUPDOeCAzLORwT Dec 3 03:02:13 localhost certmonger[39004]: fhqgwOzF1nY96wB+oMWwXQmGHSyliwFX7rZlSghum2R5Fulm8fKKRXcKoc+/YYzQ Dec 3 03:02:13 localhost certmonger[39004]: qVhk5ZRMCuV5tbopTxLgkmaGeOU3s/I76fY2Q0hyyqwCKGjUhcLOgI8OWKVEeerd Dec 3 03:02:13 localhost certmonger[39004]: tJyFF/M85X73fexgJBaT6Fb5wf4D4oG/Y6vCYoI6/iy9emfxqw/dsxexOc1GuweN Dec 3 03:02:13 localhost certmonger[39004]: 3qODZMqI/tRRERLEPF08dLuM2WjgqtjfVuAoG6E41Zq7vz8YF6c2DUrtS1SWquN7 Dec 3 03:02:13 localhost certmonger[39004]: BpxbaMhPdiVOxoYl8Hdqs002TzfOJLM2x/RUwYn7mYvjRtxXXEC+rX7vwmtAAmF1 Dec 3 03:02:13 localhost certmonger[39004]: jJElCiz+AHxPthpBDl8YQxsTxD053/x88grI9DzOs8c8fM1Bj+GnPQNbdsVAVjSk Dec 3 03:02:13 localhost certmonger[39004]: Ds3gfROgVwH1vSzDmQ== Dec 3 03:02:13 localhost certmonger[39004]: -----END CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[39004]: " Dec 3 03:02:13 localhost certmonger[39762]: 2025-12-03 08:02:13 [39762] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[39762]: MIIFSTCCA7GgAwIBAgIBGTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:13 localhost certmonger[39762]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:13 localhost certmonger[39762]: MDIxM1oXDTI3MTIwNDA4MDIxM1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:13 localhost certmonger[39762]: BAMMHm5wMDAwNTU0MzIyNi5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:13 localhost certmonger[39762]: AQEBBQADggEPADCCAQoCggEBAOV9RIBEJAunNbx6XcjoG7ib7roTd1+fN49daXQ3 Dec 3 03:02:13 localhost certmonger[39762]: kbbge/195hjmMqguxwRKPXsrr0O2tfxd4SNCWSJRIsW+H36yjJwtqXneb+FogL2i Dec 3 03:02:13 localhost certmonger[39762]: yxD4swfSMob4/IgroBSwOgcz/2MIn6cmIfOsBZmhO5JOpPL4y4T+LtGJtAwcQyXY Dec 3 03:02:13 localhost certmonger[39762]: xp2wQof62/qZ33AhbEGI8NbxnMLqUGiMy/U791uMMg1SqVQpBGzcKltYAKt/MQYV Dec 3 03:02:13 localhost certmonger[39762]: iTWYt7nI8ex9aHZ6iDsJOm849ELqBlSdDPN5g5R1gAJEVsO61I1pNGnBxJT6S82R Dec 3 03:02:13 localhost certmonger[39762]: g9d67KoMo8ouBNC/Hc4eFt4npGEe56PPrgUWa94OX4r/TI0CAwEAAaOCAd0wggHZ Dec 3 03:02:13 localhost certmonger[39762]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:13 localhost certmonger[39762]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:13 localhost certmonger[39762]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:13 localhost certmonger[39762]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:13 localhost certmonger[39762]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:13 localhost certmonger[39762]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFI7g+/3gG8cV0V1ddLxy/MEVWGXj Dec 3 03:02:13 localhost certmonger[39762]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNi5leHRlcm5hbC5vb28udGVzdKA8 Dec 3 03:02:13 localhost certmonger[39762]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI2LmV4dGVybmFsLm9vby50 Dec 3 03:02:13 localhost certmonger[39762]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:13 localhost certmonger[39762]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjYuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Dec 3 03:02:13 localhost certmonger[39762]: hvcNAQELBQADggGBADiXOt++thIZ5gmqsfbQQ3EZJeWmz/A8eiPTkdx9/XreIhZz Dec 3 03:02:13 localhost certmonger[39762]: byaNrhpzkvtSXAFjLbeXoNZ491dQSzROW24SetMXDP5yrJQ6SSyUPDOeCAzLORwT Dec 3 03:02:13 localhost certmonger[39762]: fhqgwOzF1nY96wB+oMWwXQmGHSyliwFX7rZlSghum2R5Fulm8fKKRXcKoc+/YYzQ Dec 3 03:02:13 localhost certmonger[39762]: qVhk5ZRMCuV5tbopTxLgkmaGeOU3s/I76fY2Q0hyyqwCKGjUhcLOgI8OWKVEeerd Dec 3 03:02:13 localhost certmonger[39762]: tJyFF/M85X73fexgJBaT6Fb5wf4D4oG/Y6vCYoI6/iy9emfxqw/dsxexOc1GuweN Dec 3 03:02:13 localhost certmonger[39762]: 3qODZMqI/tRRERLEPF08dLuM2WjgqtjfVuAoG6E41Zq7vz8YF6c2DUrtS1SWquN7 Dec 3 03:02:13 localhost certmonger[39762]: BpxbaMhPdiVOxoYl8Hdqs002TzfOJLM2x/RUwYn7mYvjRtxXXEC+rX7vwmtAAmF1 Dec 3 03:02:13 localhost certmonger[39762]: jJElCiz+AHxPthpBDl8YQxsTxD053/x88grI9DzOs8c8fM1Bj+GnPQNbdsVAVjSk Dec 3 03:02:13 localhost certmonger[39762]: Ds3gfROgVwH1vSzDmQ== Dec 3 03:02:13 localhost certmonger[39762]: -----END CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[39762]: ". Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Certificate submission still ongoing. Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Certificate submission postprocessing complete. Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Child status = 0. Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Child output: Dec 3 03:02:13 localhost certmonger[39004]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nDs3gfROgVwH1vSzDmQ==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 03:02:13 localhost certmonger[39004]: " Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[39004]: MIIFSTCCA7GgAwIBAgIBGTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:13 localhost certmonger[39004]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:13 localhost certmonger[39004]: MDIxM1oXDTI3MTIwNDA4MDIxM1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:13 localhost certmonger[39004]: BAMMHm5wMDAwNTU0MzIyNi5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:13 localhost certmonger[39004]: AQEBBQADggEPADCCAQoCggEBAOV9RIBEJAunNbx6XcjoG7ib7roTd1+fN49daXQ3 Dec 3 03:02:13 localhost certmonger[39004]: kbbge/195hjmMqguxwRKPXsrr0O2tfxd4SNCWSJRIsW+H36yjJwtqXneb+FogL2i Dec 3 03:02:13 localhost certmonger[39004]: yxD4swfSMob4/IgroBSwOgcz/2MIn6cmIfOsBZmhO5JOpPL4y4T+LtGJtAwcQyXY Dec 3 03:02:13 localhost certmonger[39004]: xp2wQof62/qZ33AhbEGI8NbxnMLqUGiMy/U791uMMg1SqVQpBGzcKltYAKt/MQYV Dec 3 03:02:13 localhost certmonger[39004]: iTWYt7nI8ex9aHZ6iDsJOm849ELqBlSdDPN5g5R1gAJEVsO61I1pNGnBxJT6S82R Dec 3 03:02:13 localhost certmonger[39004]: g9d67KoMo8ouBNC/Hc4eFt4npGEe56PPrgUWa94OX4r/TI0CAwEAAaOCAd0wggHZ Dec 3 03:02:13 localhost certmonger[39004]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:13 localhost certmonger[39004]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:13 localhost certmonger[39004]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:13 localhost certmonger[39004]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:13 localhost certmonger[39004]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:13 localhost certmonger[39004]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFI7g+/3gG8cV0V1ddLxy/MEVWGXj Dec 3 03:02:13 localhost certmonger[39004]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNi5leHRlcm5hbC5vb28udGVzdKA8 Dec 3 03:02:13 localhost certmonger[39004]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI2LmV4dGVybmFsLm9vby50 Dec 3 03:02:13 localhost certmonger[39004]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:13 localhost certmonger[39004]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjYuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Dec 3 03:02:13 localhost certmonger[39004]: hvcNAQELBQADggGBADiXOt++thIZ5gmqsfbQQ3EZJeWmz/A8eiPTkdx9/XreIhZz Dec 3 03:02:13 localhost certmonger[39004]: byaNrhpzkvtSXAFjLbeXoNZ491dQSzROW24SetMXDP5yrJQ6SSyUPDOeCAzLORwT Dec 3 03:02:13 localhost certmonger[39004]: fhqgwOzF1nY96wB+oMWwXQmGHSyliwFX7rZlSghum2R5Fulm8fKKRXcKoc+/YYzQ Dec 3 03:02:13 localhost certmonger[39004]: qVhk5ZRMCuV5tbopTxLgkmaGeOU3s/I76fY2Q0hyyqwCKGjUhcLOgI8OWKVEeerd Dec 3 03:02:13 localhost certmonger[39004]: tJyFF/M85X73fexgJBaT6Fb5wf4D4oG/Y6vCYoI6/iy9emfxqw/dsxexOc1GuweN Dec 3 03:02:13 localhost certmonger[39004]: 3qODZMqI/tRRERLEPF08dLuM2WjgqtjfVuAoG6E41Zq7vz8YF6c2DUrtS1SWquN7 Dec 3 03:02:13 localhost certmonger[39004]: BpxbaMhPdiVOxoYl8Hdqs002TzfOJLM2x/RUwYn7mYvjRtxXXEC+rX7vwmtAAmF1 Dec 3 03:02:13 localhost certmonger[39004]: jJElCiz+AHxPthpBDl8YQxsTxD053/x88grI9DzOs8c8fM1Bj+GnPQNbdsVAVjSk Dec 3 03:02:13 localhost certmonger[39004]: Ds3gfROgVwH1vSzDmQ== Dec 3 03:02:13 localhost certmonger[39004]: -----END CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[39004]: ". Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Certificate issued (0 chain certificates, 0 roots). Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] No hooks set for pre-save command. Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39770]: Certificate in file "/etc/pki/tls/certs/httpd-external.crt" issued by CA and saved. Dec 3 03:02:13 localhost certmonger[39004]: 2025-12-03 08:02:13 [39004] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost sedispatch[728]: AVC Message regarding setroubleshoot, ignoring message Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 685c950a-486d-4068-997c-942bd151ec45 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e9332953-9061-4876-b1ae-ef331f355ef4 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:14 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5af4ff76-9874-4a66-86aa-4c76d0fa72ca Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 89a71936-57ab-4ca8-a514-72e040b26f1c Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 89a71936-57ab-4ca8-a514-72e040b26f1c Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l df4f9928-4a2a-4e2e-a623-4aaa1fcd96dd Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l df4f9928-4a2a-4e2e-a623-4aaa1fcd96dd Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d2c4d298-414c-49d1-be74-f1ac2c8962e8 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 685c950a-486d-4068-997c-942bd151ec45 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2659a420-45a2-485d-b49c-9f644b69783e Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eff113ff-707a-4ceb-955d-88c040058fa9 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fa064fc7-c5cd-462c-804d-1b138ab9ab05 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cc0912bf-e048-47ff-90a9-96e54051f6c9 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f49dce39-e9f8-49ce-a6cf-f2bec2c30a9f Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f49dce39-e9f8-49ce-a6cf-f2bec2c30a9f Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l df099e24-5db1-4c15-968c-0196d071695d Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2659a420-45a2-485d-b49c-9f644b69783e Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f695ddf6-7656-42b9-a798-6dae68bcdb78 Dec 3 03:02:15 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d4612492-f060-43f2-90a5-618092cd9080 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d4612492-f060-43f2-90a5-618092cd9080 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 72fb1141-3e41-4660-a2eb-3a3bbc786efe Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cffcb51e-2752-433b-92bb-94fba8967648 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cffcb51e-2752-433b-92bb-94fba8967648 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost sedispatch[728]: AVC Message regarding setroubleshoot, ignoring message Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8addb9fd-37d5-469f-82ec-31e6b3986186 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8addb9fd-37d5-469f-82ec-31e6b3986186 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:16 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e3f4acdc-790e-45c4-aec0-b75cb1fedd09 Dec 3 03:02:17 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dbc0cdd6-a30d-4243-9756-4422b43f9905 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0d785d87-0a32-4369-baef-c50245e535a1 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8addb9fd-37d5-469f-82ec-31e6b3986186 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8addb9fd-37d5-469f-82ec-31e6b3986186 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 09503c46-ac3b-44ea-a9a9-e25f74260ee4 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:18 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:19 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost sedispatch[728]: AVC Message regarding setroubleshoot, ignoring message Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 685c950a-486d-4068-997c-942bd151ec45 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e9332953-9061-4876-b1ae-ef331f355ef4 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5af4ff76-9874-4a66-86aa-4c76d0fa72ca Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 89a71936-57ab-4ca8-a514-72e040b26f1c Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 89a71936-57ab-4ca8-a514-72e040b26f1c Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l df4f9928-4a2a-4e2e-a623-4aaa1fcd96dd Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l df4f9928-4a2a-4e2e-a623-4aaa1fcd96dd Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d2c4d298-414c-49d1-be74-f1ac2c8962e8 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 685c950a-486d-4068-997c-942bd151ec45 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2659a420-45a2-485d-b49c-9f644b69783e Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eff113ff-707a-4ceb-955d-88c040058fa9 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fa064fc7-c5cd-462c-804d-1b138ab9ab05 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cc0912bf-e048-47ff-90a9-96e54051f6c9 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f49dce39-e9f8-49ce-a6cf-f2bec2c30a9f Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f49dce39-e9f8-49ce-a6cf-f2bec2c30a9f Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l df099e24-5db1-4c15-968c-0196d071695d Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2659a420-45a2-485d-b49c-9f644b69783e Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f695ddf6-7656-42b9-a798-6dae68bcdb78 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d4612492-f060-43f2-90a5-618092cd9080 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d4612492-f060-43f2-90a5-618092cd9080 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 72fb1141-3e41-4660-a2eb-3a3bbc786efe Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cffcb51e-2752-433b-92bb-94fba8967648 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cffcb51e-2752-433b-92bb-94fba8967648 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8addb9fd-37d5-469f-82ec-31e6b3986186 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8addb9fd-37d5-469f-82ec-31e6b3986186 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e3f4acdc-790e-45c4-aec0-b75cb1fedd09 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dbc0cdd6-a30d-4243-9756-4422b43f9905 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0d785d87-0a32-4369-baef-c50245e535a1 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8addb9fd-37d5-469f-82ec-31e6b3986186 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7b36ef4-391a-43d0-a7ce-3af1a7cf115e Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8addb9fd-37d5-469f-82ec-31e6b3986186 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 09503c46-ac3b-44ea-a9a9-e25f74260ee4 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:20 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 685c950a-486d-4068-997c-942bd151ec45 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e9332953-9061-4876-b1ae-ef331f355ef4 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5af4ff76-9874-4a66-86aa-4c76d0fa72ca Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 89a71936-57ab-4ca8-a514-72e040b26f1c Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 89a71936-57ab-4ca8-a514-72e040b26f1c Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l df4f9928-4a2a-4e2e-a623-4aaa1fcd96dd Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l df4f9928-4a2a-4e2e-a623-4aaa1fcd96dd Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d2c4d298-414c-49d1-be74-f1ac2c8962e8 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 685c950a-486d-4068-997c-942bd151ec45 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2659a420-45a2-485d-b49c-9f644b69783e Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eff113ff-707a-4ceb-955d-88c040058fa9 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fa064fc7-c5cd-462c-804d-1b138ab9ab05 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cc0912bf-e048-47ff-90a9-96e54051f6c9 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f49dce39-e9f8-49ce-a6cf-f2bec2c30a9f Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f49dce39-e9f8-49ce-a6cf-f2bec2c30a9f Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l df099e24-5db1-4c15-968c-0196d071695d Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2659a420-45a2-485d-b49c-9f644b69783e Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f695ddf6-7656-42b9-a798-6dae68bcdb78 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d4612492-f060-43f2-90a5-618092cd9080 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d4612492-f060-43f2-90a5-618092cd9080 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 72fb1141-3e41-4660-a2eb-3a3bbc786efe Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cffcb51e-2752-433b-92bb-94fba8967648 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cffcb51e-2752-433b-92bb-94fba8967648 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8addb9fd-37d5-469f-82ec-31e6b3986186 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8addb9fd-37d5-469f-82ec-31e6b3986186 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e3f4acdc-790e-45c4-aec0-b75cb1fedd09 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dbc0cdd6-a30d-4243-9756-4422b43f9905 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0d785d87-0a32-4369-baef-c50245e535a1 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8addb9fd-37d5-469f-82ec-31e6b3986186 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7b36ef4-391a-43d0-a7ce-3af1a7cf115e Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8addb9fd-37d5-469f-82ec-31e6b3986186 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 09503c46-ac3b-44ea-a9a9-e25f74260ee4 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:21 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5af4ff76-9874-4a66-86aa-4c76d0fa72ca Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 89a71936-57ab-4ca8-a514-72e040b26f1c Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 89a71936-57ab-4ca8-a514-72e040b26f1c Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l df4f9928-4a2a-4e2e-a623-4aaa1fcd96dd Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l df4f9928-4a2a-4e2e-a623-4aaa1fcd96dd Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d2c4d298-414c-49d1-be74-f1ac2c8962e8 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 685c950a-486d-4068-997c-942bd151ec45 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2659a420-45a2-485d-b49c-9f644b69783e Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eff113ff-707a-4ceb-955d-88c040058fa9 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fa064fc7-c5cd-462c-804d-1b138ab9ab05 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cc0912bf-e048-47ff-90a9-96e54051f6c9 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f49dce39-e9f8-49ce-a6cf-f2bec2c30a9f Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f49dce39-e9f8-49ce-a6cf-f2bec2c30a9f Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l df099e24-5db1-4c15-968c-0196d071695d Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2659a420-45a2-485d-b49c-9f644b69783e Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f695ddf6-7656-42b9-a798-6dae68bcdb78 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d4612492-f060-43f2-90a5-618092cd9080 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d4612492-f060-43f2-90a5-618092cd9080 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 72fb1141-3e41-4660-a2eb-3a3bbc786efe Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cffcb51e-2752-433b-92bb-94fba8967648 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cffcb51e-2752-433b-92bb-94fba8967648 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dbc0cdd6-a30d-4243-9756-4422b43f9905 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0d785d87-0a32-4369-baef-c50245e535a1 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6b53de80-14f3-4f0f-a1c3-9123f93b63ac Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8addb9fd-37d5-469f-82ec-31e6b3986186 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d797f67-eb9a-4a9e-91ad-a1cf055ac250 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e7b36ef4-391a-43d0-a7ce-3af1a7cf115e Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8addb9fd-37d5-469f-82ec-31e6b3986186 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 09503c46-ac3b-44ea-a9a9-e25f74260ee4 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8addb9fd-37d5-469f-82ec-31e6b3986186 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 09503c46-ac3b-44ea-a9a9-e25f74260ee4 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fcfbf224-d310-4596-8220-31ae480e5a93 Dec 3 03:02:22 localhost setroubleshoot[39619]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost sshd[39772]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:02:28 localhost sshd[39775]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:02:32 localhost systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Dec 3 03:02:32 localhost systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.840s CPU time. Dec 3 03:02:33 localhost systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 3 03:02:33 localhost systemd[1]: setroubleshootd.service: Consumed 14.611s CPU time. Dec 3 03:02:35 localhost sshd[39778]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:02:37 localhost sshd[39780]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:02:50 localhost sshd[39783]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:02:50 localhost sshd[39785]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:02:59 localhost sshd[39786]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:03:10 localhost sshd[39788]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:03:22 localhost sshd[39791]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:03:23 localhost sshd[39793]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:03:27 localhost sshd[39796]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:03:29 localhost sshd[39799]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:03:35 localhost sshd[39800]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:03:39 localhost sshd[39802]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:03:55 localhost sshd[39804]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:04:00 localhost sshd[39806]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:04:01 localhost sshd[39808]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:04:01 localhost sshd[39810]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:04:22 localhost sshd[39812]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:04:36 localhost sshd[39816]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:04:42 localhost sshd[39819]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:04:45 localhost sshd[39821]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:04:49 localhost sshd[39822]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:04:53 localhost sshd[39825]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:05:06 localhost sshd[39827]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:05:09 localhost sshd[39829]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:05:17 localhost sshd[39831]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:05:19 localhost sshd[39833]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:05:22 localhost sshd[39836]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:05:29 localhost sshd[39838]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:05:30 localhost sshd[39840]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:05:42 localhost sshd[39842]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:05:47 localhost sshd[39844]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:05:48 localhost sshd[39846]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:05:57 localhost sshd[39849]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:06:05 localhost sshd[39851]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:06:32 localhost sshd[39853]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:06:33 localhost sshd[39855]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:06:35 localhost sshd[39857]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:06:36 localhost sshd[39859]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:06:39 localhost sshd[39862]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:06:43 localhost sshd[39864]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:06:57 localhost sshd[39865]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:06:59 localhost sshd[39868]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:07:09 localhost sshd[39870]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:07:16 localhost sshd[39872]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:07:22 localhost sshd[39875]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:07:26 localhost sshd[39876]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:07:27 localhost sshd[39878]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:07:34 localhost sshd[39881]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:07:56 localhost sshd[39883]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:08:03 localhost sshd[39885]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:08:08 localhost sshd[39888]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:08:12 localhost sshd[39890]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:08:22 localhost sshd[39892]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:08:22 localhost sshd[39894]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:08:28 localhost sshd[39896]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:08:31 localhost sshd[39898]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:08:40 localhost sshd[39900]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:08:41 localhost sshd[39902]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:09:17 localhost sshd[39904]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:09:23 localhost sshd[39906]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:09:28 localhost sshd[39909]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:09:29 localhost sshd[39911]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:09:30 localhost sshd[39912]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:09:31 localhost krb5_child[39917]: Client's credentials have been revoked Dec 3 03:09:31 localhost krb5_child[39917]: Client's credentials have been revoked Dec 3 03:09:35 localhost krb5_child[39921]: Client's credentials have been revoked Dec 3 03:09:35 localhost krb5_child[39921]: Client's credentials have been revoked Dec 3 03:09:41 localhost sshd[39922]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:09:41 localhost sshd[39924]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:09:42 localhost sshd[39926]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:09:47 localhost sshd[39929]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:09:51 localhost sshd[39932]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:10:00 localhost sshd[39935]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:10:25 localhost sshd[39937]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:10:28 localhost sshd[39939]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:10:33 localhost sshd[39941]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:10:37 localhost sshd[39943]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:10:38 localhost sshd[39944]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:10:47 localhost sshd[39946]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:10:54 localhost sshd[39948]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:10:57 localhost sshd[39951]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:10:59 localhost sshd[39953]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:11:01 localhost krb5_child[39956]: Client's credentials have been revoked Dec 3 03:11:01 localhost krb5_child[39956]: Client's credentials have been revoked Dec 3 03:11:02 localhost sshd[39957]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:11:03 localhost krb5_child[39960]: Client's credentials have been revoked Dec 3 03:11:03 localhost krb5_child[39960]: Client's credentials have been revoked Dec 3 03:11:05 localhost krb5_child[39963]: Client's credentials have been revoked Dec 3 03:11:05 localhost krb5_child[39963]: Client's credentials have been revoked Dec 3 03:11:08 localhost sshd[39964]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:11:09 localhost krb5_child[39967]: Client's credentials have been revoked Dec 3 03:11:09 localhost krb5_child[39967]: Client's credentials have been revoked Dec 3 03:11:13 localhost sshd[39968]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:11:14 localhost krb5_child[39972]: Client's credentials have been revoked Dec 3 03:11:14 localhost krb5_child[39972]: Client's credentials have been revoked Dec 3 03:11:19 localhost sshd[39973]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:11:24 localhost sshd[39976]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:11:32 localhost sshd[39978]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:11:58 localhost sshd[39980]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:11:59 localhost sshd[39982]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:12:00 localhost sshd[39984]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:12:02 localhost sshd[39986]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:12:14 localhost sshd[39988]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:12:18 localhost sshd[39991]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:12:21 localhost sshd[39993]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:12:29 localhost sshd[39995]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:12:35 localhost sshd[39997]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:12:52 localhost sshd[39998]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:12:59 localhost sshd[40000]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:13:04 localhost sshd[40002]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:13:09 localhost sshd[40006]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:13:14 localhost sshd[40008]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:13:14 localhost sshd[40011]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:13:21 localhost sshd[40013]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:13:27 localhost sshd[40015]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:13:38 localhost sshd[40018]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:13:40 localhost sshd[40020]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:13:46 localhost sshd[40022]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:14:08 localhost sshd[40024]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:14:08 localhost sshd[40026]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:14:18 localhost sshd[40029]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:14:22 localhost sshd[40032]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:14:27 localhost sshd[40033]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:14:35 localhost sshd[40036]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:14:40 localhost sshd[40039]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:14:49 localhost sshd[40041]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:14:52 localhost sshd[40044]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:14:58 localhost sshd[40047]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:15:03 localhost sshd[40049]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:15:14 localhost sshd[40053]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:15:22 localhost sshd[40055]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:15:29 localhost sshd[40057]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:15:34 localhost sshd[40059]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:15:36 localhost krb5_child[40063]: Client's credentials have been revoked Dec 3 03:15:36 localhost krb5_child[40063]: Client's credentials have been revoked Dec 3 03:15:39 localhost sshd[40064]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:15:41 localhost krb5_child[40068]: Client's credentials have been revoked Dec 3 03:15:41 localhost krb5_child[40068]: Client's credentials have been revoked Dec 3 03:15:55 localhost sshd[40069]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:15:58 localhost sshd[40071]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:15:58 localhost sshd[40073]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:16:03 localhost sshd[40076]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:16:06 localhost sshd[40078]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:16:19 localhost sshd[40080]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:16:20 localhost sshd[40082]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:16:24 localhost sshd[40086]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:16:43 localhost sshd[40089]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:16:54 localhost sshd[40091]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:17:08 localhost sshd[40094]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:17:16 localhost sshd[40096]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:17:21 localhost sshd[40098]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:17:22 localhost sshd[40100]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:17:34 localhost sshd[40102]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:17:35 localhost sshd[40104]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:17:43 localhost sshd[40107]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:17:47 localhost sshd[40109]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:17:48 localhost sshd[40110]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:17:48 localhost sshd[40112]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:18:19 localhost sshd[40116]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:18:39 localhost sshd[40118]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:18:40 localhost sshd[40120]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:18:41 localhost sshd[40122]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:19:01 localhost sshd[40126]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:19:04 localhost sshd[40128]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:19:13 localhost sshd[40130]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:19:29 localhost sshd[40132]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:19:32 localhost sshd[40135]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:19:34 localhost sshd[40137]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:19:40 localhost sshd[40139]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:19:53 localhost sshd[40142]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:19:55 localhost sshd[40144]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:20:11 localhost sshd[40148]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:20:21 localhost sshd[40150]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:20:26 localhost sshd[40153]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:20:35 localhost sshd[40155]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:20:39 localhost sshd[40157]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:20:41 localhost sshd[40159]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:20:44 localhost sshd[40162]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:21:16 localhost sshd[40164]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:21:21 localhost sshd[40167]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:21:55 localhost sshd[40170]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:22:00 localhost sshd[40172]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:22:08 localhost sshd[40174]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:22:08 localhost sshd[40176]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:22:21 localhost sshd[40180]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:22:38 localhost sshd[40182]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:22:48 localhost sshd[40184]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:23:16 localhost sshd[40185]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:23:18 localhost sshd[40187]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:23:21 localhost sshd[40189]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:23:35 localhost sshd[40191]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:23:42 localhost sshd[40193]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:23:58 localhost sshd[40196]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:24:11 localhost sshd[40199]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:24:23 localhost sshd[40201]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:24:35 localhost sshd[40203]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:24:44 localhost systemd[1]: session-15.scope: Deactivated successfully. Dec 3 03:24:44 localhost systemd[1]: session-15.scope: Consumed 3.289s CPU time. Dec 3 03:24:44 localhost systemd-logind[36415]: Session 15 logged out. Waiting for processes to exit. Dec 3 03:24:44 localhost systemd-logind[36415]: Removed session 15. Dec 3 03:24:54 localhost systemd[1]: Stopping User Manager for UID 1000... Dec 3 03:24:54 localhost systemd[4176]: Activating special unit Exit the Session... Dec 3 03:24:54 localhost systemd[4176]: Stopping podman-pause-5103b13e.scope... Dec 3 03:24:54 localhost systemd[4176]: Removed slice User Background Tasks Slice. Dec 3 03:24:54 localhost systemd[4176]: Stopped target Main User Target. Dec 3 03:24:54 localhost systemd[4176]: Stopped target Basic System. Dec 3 03:24:54 localhost systemd[4176]: Stopped target Paths. Dec 3 03:24:54 localhost systemd[4176]: Stopped target Sockets. Dec 3 03:24:54 localhost systemd[4176]: Stopped target Timers. Dec 3 03:24:54 localhost systemd[4176]: Stopped Mark boot as successful after the user session has run 2 minutes. Dec 3 03:24:54 localhost systemd[4176]: Stopped Daily Cleanup of User's Temporary Directories. Dec 3 03:24:54 localhost dbus-broker[18443]: Dispatched 247 messages @ 16(±109)μs / message. Dec 3 03:24:54 localhost systemd[4176]: Stopping D-Bus User Message Bus... Dec 3 03:24:54 localhost systemd[4176]: Stopped Create User's Volatile Files and Directories. Dec 3 03:24:54 localhost systemd[4176]: Stopped podman-pause-5103b13e.scope. Dec 3 03:24:54 localhost systemd[4176]: Stopped D-Bus User Message Bus. Dec 3 03:24:54 localhost systemd[4176]: Removed slice Slice /user. Dec 3 03:24:54 localhost systemd[4176]: Closed D-Bus User Message Bus Socket. Dec 3 03:24:54 localhost systemd[4176]: Removed slice User Application Slice. Dec 3 03:24:54 localhost systemd[4176]: Reached target Shutdown. Dec 3 03:24:54 localhost systemd[4176]: Finished Exit the Session. Dec 3 03:24:54 localhost systemd[4176]: Reached target Exit the Session. Dec 3 03:24:54 localhost systemd[1]: user@1000.service: Deactivated successfully. Dec 3 03:24:54 localhost systemd[1]: Stopped User Manager for UID 1000. Dec 3 03:25:02 localhost sshd[40207]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:25:04 localhost sshd[40210]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:25:14 localhost sshd[40212]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:25:15 localhost krb5_child[40215]: Preauthentication failed Dec 3 03:25:15 localhost krb5_child[40215]: Preauthentication failed Dec 3 03:25:17 localhost sshd[40216]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:25:49 localhost sshd[40219]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:25:52 localhost sshd[40221]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:26:02 localhost sshd[40224]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:26:27 localhost sshd[40226]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:26:31 localhost sshd[40228]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:26:36 localhost sshd[40230]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:27:03 localhost sshd[40232]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:27:39 localhost sshd[40234]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:27:53 localhost sshd[40236]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:28:16 localhost sshd[40239]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:28:17 localhost sshd[40240]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:28:22 localhost sshd[40242]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:28:54 localhost sshd[40244]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:29:23 localhost sshd[40246]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:29:25 localhost krb5_child[40249]: Preauthentication failed Dec 3 03:29:25 localhost krb5_child[40249]: Preauthentication failed Dec 3 03:29:30 localhost sshd[40250]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:30:14 localhost sshd[40253]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:30:21 localhost sshd[40254]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:30:43 localhost sshd[40257]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:30:53 localhost sshd[40260]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:30:56 localhost sshd[40263]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:31:07 localhost sshd[40266]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:31:57 localhost sshd[40271]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:31:58 localhost sshd[40273]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:32:13 localhost systemd[1]: session-16.scope: Deactivated successfully. Dec 3 03:32:13 localhost systemd[1]: session-16.scope: Consumed 3min 31.001s CPU time. Dec 3 03:32:13 localhost systemd-logind[36415]: Session 16 logged out. Waiting for processes to exit. Dec 3 03:32:13 localhost systemd-logind[36415]: Removed session 16. Dec 3 03:32:22 localhost sshd[40276]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:32:23 localhost systemd[1]: Stopping User Manager for UID 1002... Dec 3 03:32:23 localhost systemd[26556]: Activating special unit Exit the Session... Dec 3 03:32:23 localhost systemd[26556]: Removed slice User Background Tasks Slice. Dec 3 03:32:23 localhost systemd[26556]: Stopped target Main User Target. Dec 3 03:32:23 localhost systemd[26556]: Stopped target Basic System. Dec 3 03:32:23 localhost systemd[26556]: Stopped target Paths. Dec 3 03:32:23 localhost systemd[26556]: Stopped target Sockets. Dec 3 03:32:23 localhost systemd[26556]: Stopped target Timers. Dec 3 03:32:23 localhost systemd[26556]: Stopped Mark boot as successful after the user session has run 2 minutes. Dec 3 03:32:23 localhost systemd[26556]: Stopped Daily Cleanup of User's Temporary Directories. Dec 3 03:32:23 localhost systemd[26556]: Closed D-Bus User Message Bus Socket. Dec 3 03:32:23 localhost systemd[26556]: Stopped Create User's Volatile Files and Directories. Dec 3 03:32:23 localhost systemd[26556]: Removed slice User Application Slice. Dec 3 03:32:23 localhost systemd[26556]: Reached target Shutdown. Dec 3 03:32:23 localhost systemd[26556]: Finished Exit the Session. Dec 3 03:32:23 localhost systemd[26556]: Reached target Exit the Session. Dec 3 03:32:23 localhost systemd[1]: user@1002.service: Deactivated successfully. Dec 3 03:32:23 localhost systemd[1]: Stopped User Manager for UID 1002. Dec 3 03:32:23 localhost systemd[1]: Stopping User Runtime Directory /run/user/1002... Dec 3 03:32:23 localhost systemd[1]: run-user-1002.mount: Deactivated successfully. Dec 3 03:32:23 localhost systemd[1]: user-runtime-dir@1002.service: Deactivated successfully. Dec 3 03:32:23 localhost systemd[1]: Stopped User Runtime Directory /run/user/1002. Dec 3 03:32:23 localhost systemd[1]: Removed slice User Slice of UID 1002. Dec 3 03:32:23 localhost systemd[1]: user-1002.slice: Consumed 3min 31.241s CPU time. Dec 3 03:33:05 localhost sshd[40282]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:33:23 localhost sshd[40285]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:33:27 localhost sshd[40287]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:33:50 localhost sshd[40289]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:34:12 localhost sshd[40292]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:35:23 localhost sshd[40293]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:35:47 localhost sshd[40295]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:35:51 localhost sshd[40296]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:36:00 localhost sshd[40298]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:36:11 localhost sshd[40300]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:36:51 localhost sshd[40303]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:36:51 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=4064 DF PROTO=TCP SPT=7720 DPT=9090 SEQ=2897059994 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB1728E6000000000103030A) Dec 3 03:36:52 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=4065 DF PROTO=TCP SPT=7720 DPT=9090 SEQ=2897059994 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB172D02000000000103030A) Dec 3 03:36:55 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=4066 DF PROTO=TCP SPT=7720 DPT=9090 SEQ=2897059994 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB173500000000000103030A) Dec 3 03:36:59 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=4067 DF PROTO=TCP SPT=7720 DPT=9090 SEQ=2897059994 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB1744C0000000000103030A) Dec 3 03:37:07 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=10223 DF PROTO=TCP SPT=13182 DPT=9090 SEQ=1630244632 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB176403000000000103030A) Dec 3 03:37:10 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=10225 DF PROTO=TCP SPT=13182 DPT=9090 SEQ=1630244632 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB177001000000000103030A) Dec 3 03:37:14 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=10226 DF PROTO=TCP SPT=13182 DPT=9090 SEQ=1630244632 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB177FC1000000000103030A) Dec 3 03:37:23 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=45958 DF PROTO=TCP SPT=13038 DPT=9090 SEQ=4189005545 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98E95BF000000000103030A) Dec 3 03:37:24 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=45959 DF PROTO=TCP SPT=13038 DPT=9090 SEQ=4189005545 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98E99D3000000000103030A) Dec 3 03:37:26 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=45960 DF PROTO=TCP SPT=13038 DPT=9090 SEQ=4189005545 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98EA1D2000000000103030A) Dec 3 03:37:26 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=29640 DF PROTO=TCP SPT=23920 DPT=9090 SEQ=3707074188 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB17AEFF000000000103030A) Dec 3 03:37:27 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=29641 DF PROTO=TCP SPT=23920 DPT=9090 SEQ=3707074188 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB17B300000000000103030A) Dec 3 03:37:29 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=29642 DF PROTO=TCP SPT=23920 DPT=9090 SEQ=3707074188 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB17BB00000000000103030A) Dec 3 03:37:30 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=45961 DF PROTO=TCP SPT=13038 DPT=9090 SEQ=4189005545 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98EB192000000000103030A) Dec 3 03:37:33 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=29643 DF PROTO=TCP SPT=23920 DPT=9090 SEQ=3707074188 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB17CAC0000000000103030A) Dec 3 03:37:38 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=17005 DF PROTO=TCP SPT=59272 DPT=9090 SEQ=2254720623 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98ED06B000000000103030A) Dec 3 03:37:39 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=17006 DF PROTO=TCP SPT=59272 DPT=9090 SEQ=2254720623 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98ED492000000000103030A) Dec 3 03:37:41 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=17007 DF PROTO=TCP SPT=59272 DPT=9090 SEQ=2254720623 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98EDC92000000000103030A) Dec 3 03:37:41 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=11147 DF PROTO=TCP SPT=29456 DPT=9090 SEQ=3158903820 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB17EA1F000000000103030A) Dec 3 03:37:41 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=29644 DF PROTO=TCP SPT=23920 DPT=9090 SEQ=3707074188 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB17EB81000000000103030A) Dec 3 03:37:42 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=11148 DF PROTO=TCP SPT=29456 DPT=9090 SEQ=3158903820 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB17EE41000000000103030A) Dec 3 03:37:44 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=11149 DF PROTO=TCP SPT=29456 DPT=9090 SEQ=3158903820 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB17F641000000000103030A) Dec 3 03:37:45 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=17008 DF PROTO=TCP SPT=59272 DPT=9090 SEQ=2254720623 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98EEC53000000000103030A) Dec 3 03:37:47 localhost sshd[40305]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:37:48 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=11150 DF PROTO=TCP SPT=29456 DPT=9090 SEQ=3158903820 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB180600000000000103030A) Dec 3 03:37:56 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=43326 DF PROTO=TCP SPT=31662 DPT=9090 SEQ=3823572101 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98F17CD000000000103030A) Dec 3 03:37:56 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=66.132.153.138 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=11151 DF PROTO=TCP SPT=29456 DPT=9090 SEQ=3158903820 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080ACB182580000000000103030A) Dec 3 03:37:57 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=43327 DF PROTO=TCP SPT=31662 DPT=9090 SEQ=3823572101 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98F1BD2000000000103030A) Dec 3 03:37:59 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=43328 DF PROTO=TCP SPT=31662 DPT=9090 SEQ=3823572101 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98F23D3000000000103030A) Dec 3 03:38:01 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=34456 DF PROTO=TCP SPT=42466 DPT=9090 SEQ=3984378932 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546DDEB2000000000103030A) Dec 3 03:38:02 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=34457 DF PROTO=TCP SPT=42466 DPT=9090 SEQ=3984378932 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546DE2CE000000000103030A) Dec 3 03:38:03 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=43329 DF PROTO=TCP SPT=31662 DPT=9090 SEQ=3823572101 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98F3393000000000103030A) Dec 3 03:38:04 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=34458 DF PROTO=TCP SPT=42466 DPT=9090 SEQ=3984378932 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546DEACE000000000103030A) Dec 3 03:38:06 localhost sshd[40307]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:38:07 localhost sshd[40309]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:38:08 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=34459 DF PROTO=TCP SPT=42466 DPT=9090 SEQ=3984378932 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546DFA8E000000000103030A) Dec 3 03:38:11 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=43330 DF PROTO=TCP SPT=31662 DPT=9090 SEQ=3823572101 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98F5413000000000103030A) Dec 3 03:38:13 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=49038 DF PROTO=TCP SPT=27050 DPT=9090 SEQ=1507744183 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98F5A21000000000103030A) Dec 3 03:38:14 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=49039 DF PROTO=TCP SPT=27050 DPT=9090 SEQ=1507744183 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98F5E13000000000103030A) Dec 3 03:38:16 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=49040 DF PROTO=TCP SPT=27050 DPT=9090 SEQ=1507744183 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98F6613000000000103030A) Dec 3 03:38:17 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=34460 DF PROTO=TCP SPT=42466 DPT=9090 SEQ=3984378932 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546E1B0E000000000103030A) Dec 3 03:38:18 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=23877 DF PROTO=TCP SPT=36860 DPT=9090 SEQ=2865936606 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546E1EDC000000000103030A) Dec 3 03:38:19 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=23878 DF PROTO=TCP SPT=36860 DPT=9090 SEQ=2865936606 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546E22CE000000000103030A) Dec 3 03:38:19 localhost sshd[40310]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:38:20 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=162.142.125.121 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=49041 DF PROTO=TCP SPT=27050 DPT=9090 SEQ=1507744183 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE98F75D2000000000103030A) Dec 3 03:38:25 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=23880 DF PROTO=TCP SPT=36860 DPT=9090 SEQ=2865936606 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546E3A8E000000000103030A) Dec 3 03:38:33 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=23881 DF PROTO=TCP SPT=36860 DPT=9090 SEQ=2865936606 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546E5B0E000000000103030A) Dec 3 03:38:35 localhost sshd[40312]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:38:46 localhost sshd[40315]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:39:44 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=41480 DF PROTO=TCP SPT=62576 DPT=9090 SEQ=3823774067 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546F70C9000000000103030A) Dec 3 03:39:45 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=41481 DF PROTO=TCP SPT=62576 DPT=9090 SEQ=3823774067 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546F74CE000000000103030A) Dec 3 03:39:46 localhost sshd[40316]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:39:47 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=41482 DF PROTO=TCP SPT=62576 DPT=9090 SEQ=3823774067 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546F7CCE000000000103030A) Dec 3 03:39:51 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=41483 DF PROTO=TCP SPT=62576 DPT=9090 SEQ=3823774067 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546F8C8F000000000103030A) Dec 3 03:39:59 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=53674 DF PROTO=TCP SPT=23712 DPT=9090 SEQ=2986604248 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546FAC51000000000103030A) Dec 3 03:40:00 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=53675 DF PROTO=TCP SPT=23712 DPT=9090 SEQ=2986604248 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546FB04E000000000103030A) Dec 3 03:40:02 localhost sshd[40319]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:40:02 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=53676 DF PROTO=TCP SPT=23712 DPT=9090 SEQ=2986604248 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546FB84F000000000103030A) Dec 3 03:40:06 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=167.94.138.53 DST=38.102.83.136 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=53677 DF PROTO=TCP SPT=23712 DPT=9090 SEQ=2986604248 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A546FC80E000000000103030A) Dec 3 03:41:05 localhost sshd[40321]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:41:17 localhost sshd[40323]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:41:25 localhost sshd[40325]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:41:26 localhost krb5_child[40328]: Preauthentication failed Dec 3 03:41:26 localhost krb5_child[40328]: Preauthentication failed Dec 3 03:41:26 localhost sshd[40329]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:41:31 localhost krb5_child[40333]: Preauthentication failed Dec 3 03:41:31 localhost krb5_child[40333]: Preauthentication failed Dec 3 03:41:59 localhost sshd[40334]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:42:04 localhost sshd[40335]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:42:21 localhost sshd[40338]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:42:23 localhost krb5_child[40341]: Preauthentication failed Dec 3 03:42:23 localhost krb5_child[40341]: Preauthentication failed Dec 3 03:42:27 localhost krb5_child[40344]: Preauthentication failed Dec 3 03:42:27 localhost krb5_child[40344]: Preauthentication failed Dec 3 03:42:40 localhost sshd[40345]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:42:46 localhost sshd[40348]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:43:12 localhost systemd[1]: Starting dnf makecache... Dec 3 03:43:12 localhost dnf[40350]: Updating Subscription Management repositories. Dec 3 03:43:14 localhost dnf[40350]: Metadata cache refreshed recently. Dec 3 03:43:14 localhost systemd[1]: dnf-makecache.service: Deactivated successfully. Dec 3 03:43:14 localhost systemd[1]: Finished dnf makecache. Dec 3 03:43:14 localhost systemd[1]: dnf-makecache.service: Consumed 2.021s CPU time. Dec 3 03:43:28 localhost sshd[40352]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:43:38 localhost sshd[40354]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:43:55 localhost sshd[40357]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:44:13 localhost sshd[40358]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:44:55 localhost sshd[40360]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:46:10 localhost sshd[40363]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:46:52 localhost sshd[40367]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:47:10 localhost sshd[40369]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:47:35 localhost sshd[40372]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:47:36 localhost krb5_child[40375]: Client's credentials have been revoked Dec 3 03:47:36 localhost krb5_child[40375]: Client's credentials have been revoked Dec 3 03:47:41 localhost krb5_child[40378]: Client's credentials have been revoked Dec 3 03:47:41 localhost krb5_child[40378]: Client's credentials have been revoked Dec 3 03:47:41 localhost sshd[40379]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:48:48 localhost sshd[40382]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:48:58 localhost sshd[40385]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:49:27 localhost sshd[40387]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:49:30 localhost sshd[40389]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:51:18 localhost sshd[40392]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:53:53 localhost sshd[40396]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:54:05 localhost sshd[40400]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:54:18 localhost sshd[40402]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:56:26 localhost sshd[40405]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:58:44 localhost sshd[40408]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:58:59 localhost sshd[40410]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:59:16 localhost sshd[40412]: main: sshd: ssh-rsa algorithm is disabled Dec 3 04:00:58 localhost sshd[40416]: main: sshd: ssh-rsa algorithm is disabled Dec 3 04:01:35 localhost sshd[40430]: main: sshd: ssh-rsa algorithm is disabled Dec 3 04:01:40 localhost sshd[40432]: main: sshd: ssh-rsa algorithm is disabled Dec 3 04:10:09 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=16195 DF PROTO=TCP SPT=37730 DPT=19885 SEQ=1301410863 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A4AB458A10000000001030307) Dec 3 04:10:09 localhost sshd[40438]: main: sshd: ssh-rsa algorithm is disabled Dec 3 04:10:09 localhost systemd[1]: Starting User Manager for UID 1000... Dec 3 04:10:09 localhost systemd-logind[36415]: New session 18 of user zuul. Dec 3 04:10:09 localhost systemd[40442]: Queued start job for default target Main User Target. Dec 3 04:10:09 localhost systemd[40442]: Created slice User Application Slice. Dec 3 04:10:09 localhost systemd[40442]: Started Mark boot as successful after the user session has run 2 minutes. Dec 3 04:10:09 localhost systemd[40442]: Started Daily Cleanup of User's Temporary Directories. Dec 3 04:10:09 localhost systemd[40442]: Reached target Paths. Dec 3 04:10:09 localhost systemd[40442]: Reached target Timers. Dec 3 04:10:09 localhost systemd[40442]: Starting D-Bus User Message Bus Socket... Dec 3 04:10:09 localhost systemd[40442]: Starting Create User's Volatile Files and Directories... Dec 3 04:10:09 localhost systemd[40442]: Finished Create User's Volatile Files and Directories. Dec 3 04:10:09 localhost systemd[40442]: Listening on D-Bus User Message Bus Socket. Dec 3 04:10:09 localhost systemd[40442]: Reached target Sockets. Dec 3 04:10:09 localhost systemd[40442]: Reached target Basic System. Dec 3 04:10:09 localhost systemd[40442]: Reached target Main User Target. Dec 3 04:10:09 localhost systemd[40442]: Startup finished in 92ms. Dec 3 04:10:09 localhost systemd[1]: Started User Manager for UID 1000. Dec 3 04:10:09 localhost systemd[1]: Started Session 18 of User zuul. Dec 3 04:10:10 localhost python3[40473]: ansible-ansible.legacy.command Invoked with _raw_params=subscription-manager unregister#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-da4a-51e2-00000000000c-1-overcloudcontroller1 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 04:10:10 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=16196 DF PROTO=TCP SPT=37730 DPT=19885 SEQ=1301410863 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A4AB45C8E0000000001030307) Dec 3 04:10:10 localhost subscription-manager[40474]: Unregistered machine with identity: 18bf20b8-2691-44f6-aea1-681782216598 Dec 3 04:10:12 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:94:16:be MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.136 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=16197 DF PROTO=TCP SPT=37730 DPT=19885 SEQ=1301410863 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A4AB4648E0000000001030307) Dec 3 04:10:16 localhost systemd[1]: session-18.scope: Deactivated successfully. Dec 3 04:10:16 localhost systemd-logind[36415]: Session 18 logged out. Waiting for processes to exit. Dec 3 04:10:16 localhost systemd-logind[36415]: Removed session 18. Dec 3 04:10:26 localhost systemd[1]: Stopping User Manager for UID 1000... Dec 3 04:10:26 localhost systemd[40442]: Activating special unit Exit the Session... Dec 3 04:10:26 localhost systemd[40442]: Stopped target Main User Target. Dec 3 04:10:26 localhost systemd[40442]: Stopped target Basic System. Dec 3 04:10:26 localhost systemd[40442]: Stopped target Paths. Dec 3 04:10:26 localhost systemd[40442]: Stopped target Sockets. Dec 3 04:10:26 localhost systemd[40442]: Stopped target Timers. Dec 3 04:10:26 localhost systemd[40442]: Stopped Mark boot as successful after the user session has run 2 minutes. Dec 3 04:10:26 localhost systemd[40442]: Stopped Daily Cleanup of User's Temporary Directories. Dec 3 04:10:26 localhost systemd[40442]: Closed D-Bus User Message Bus Socket. Dec 3 04:10:26 localhost systemd[40442]: Stopped Create User's Volatile Files and Directories. Dec 3 04:10:26 localhost systemd[40442]: Removed slice User Application Slice. Dec 3 04:10:26 localhost systemd[40442]: Reached target Shutdown. Dec 3 04:10:26 localhost systemd[40442]: Finished Exit the Session. Dec 3 04:10:26 localhost systemd[40442]: Reached target Exit the Session. Dec 3 04:10:26 localhost systemd[1]: user@1000.service: Deactivated successfully. Dec 3 04:10:26 localhost systemd[1]: Stopped User Manager for UID 1000. Dec 3 04:10:27 localhost sshd[40477]: main: sshd: ssh-rsa algorithm is disabled Dec 3 04:10:27 localhost systemd[1]: Starting User Manager for UID 1000... Dec 3 04:10:27 localhost systemd-logind[36415]: New session 20 of user zuul.